========================================= 
Tue,  31 May 2005 - Debian 3.0r6 released
=========================================
stable/main/binary-sparc/libdps1-dbg_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xutils_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/proxymngr_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/libdps1_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xlibs-dbg_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/libdps-dev_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xprt_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/libxaw6_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/libxaw7-dev_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/libxaw7-dbg_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xserver-xfree86_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xlibmesa3_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xlibmesa-dev_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/libxaw6-dbg_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xnest_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xserver-common_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/twm_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xlibosmesa3-dbg_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/lbxproxy_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xbase-clients_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xlibs-pic_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xlibosmesa3_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xlibs-dev_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/libxaw6-dev_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xfwp_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xterm_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xmh_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xdm_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xfs_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/x-window-system-core_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/libxaw7_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xlibs_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xvfb_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xlibmesa3-dbg_4.1.0-16woody6_sparc.deb
stable/main/binary-sparc/xlibosmesa-dev_4.1.0-16woody6_sparc.deb
xfree86 (4.1.0-16woody6) stable-security; urgency=high
  * Security update release.  Resolves the following issue:
    + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute
      arbitrary code via a negative bitmap_unit value that leads to a buffer
      overflow.  (Closes: #298939)
  * Update patch #076 (XPM library security fixes) to revert regressions in
    functionality caused by overly aggressive validation of filespec strings
    in OpenReadFile() and OpenWriteFile().  (Fixes #286164 for woody.)


stable/main/binary-s390/libxaw6_4.1.0-16woody6_s390.deb
stable/main/binary-s390/xserver-common_4.1.0-16woody6_s390.deb
stable/main/binary-s390/xfwp_4.1.0-16woody6_s390.deb
stable/main/binary-s390/xmh_4.1.0-16woody6_s390.deb
stable/main/binary-s390/libdps1_4.1.0-16woody6_s390.deb
stable/main/binary-s390/twm_4.1.0-16woody6_s390.deb
stable/main/binary-s390/xlibmesa3-dbg_4.1.0-16woody6_s390.deb
stable/main/binary-s390/xvfb_4.1.0-16woody6_s390.deb
stable/main/binary-s390/libxaw7-dev_4.1.0-16woody6_s390.deb
stable/main/binary-s390/libdps-dev_4.1.0-16woody6_s390.deb
stable/main/binary-s390/xutils_4.1.0-16woody6_s390.deb
stable/main/binary-s390/xlibs-dbg_4.1.0-16woody6_s390.deb
stable/main/binary-s390/xlibmesa3_4.1.0-16woody6_s390.deb
stable/main/binary-s390/libxaw7_4.1.0-16woody6_s390.deb
stable/main/binary-s390/xdm_4.1.0-16woody6_s390.deb
stable/main/binary-s390/xlibs-dev_4.1.0-16woody6_s390.deb
stable/main/binary-s390/x-window-system-core_4.1.0-16woody6_s390.deb
stable/main/binary-s390/xterm_4.1.0-16woody6_s390.deb
stable/main/binary-s390/xlibs_4.1.0-16woody6_s390.deb
stable/main/binary-s390/xfs_4.1.0-16woody6_s390.deb
stable/main/binary-s390/xnest_4.1.0-16woody6_s390.deb
stable/main/binary-s390/lbxproxy_4.1.0-16woody6_s390.deb
stable/main/binary-s390/libxaw7-dbg_4.1.0-16woody6_s390.deb
stable/main/binary-s390/xprt_4.1.0-16woody6_s390.deb
stable/main/binary-s390/libdps1-dbg_4.1.0-16woody6_s390.deb
stable/main/binary-s390/proxymngr_4.1.0-16woody6_s390.deb
stable/main/binary-s390/xbase-clients_4.1.0-16woody6_s390.deb
stable/main/binary-s390/xlibmesa-dev_4.1.0-16woody6_s390.deb
stable/main/binary-s390/xlibs-pic_4.1.0-16woody6_s390.deb
stable/main/binary-s390/libxaw6-dbg_4.1.0-16woody6_s390.deb
stable/main/binary-s390/libxaw6-dev_4.1.0-16woody6_s390.deb
xfree86 (4.1.0-16woody6) stable-security; urgency=high
  * Security update release.  Resolves the following issue:
    + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute
      arbitrary code via a negative bitmap_unit value that leads to a buffer
      overflow.  (Closes: #298939)
  * Update patch #076 (XPM library security fixes) to revert regressions in
    functionality caused by overly aggressive validation of filespec strings
    in OpenReadFile() and OpenWriteFile().  (Fixes #286164 for woody.)


stable/main/binary-mipsel/xterm_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/x-window-system-core_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/xmh_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/xfwp_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/xlibs_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/libxaw7-dbg_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/xlibmesa-dev_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/xserver-common_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/libxaw6-dbg_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/xvfb_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/libxaw7_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/libdps-dev_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/xlibs-pic_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/xbase-clients_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/xlibs-dbg_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/xdm_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/libdps1_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/xserver-xfree86_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/twm_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/libdps1-dbg_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/proxymngr_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/xprt_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/xlibmesa3-dbg_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/libxaw7-dev_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/xfs_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/lbxproxy_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/libxaw6_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/xnest_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/xutils_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/xlibs-dev_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/xlibmesa3_4.1.0-16woody6_mipsel.deb
stable/main/binary-mipsel/libxaw6-dev_4.1.0-16woody6_mipsel.deb
xfree86 (4.1.0-16woody6) stable-security; urgency=high
  * Security update release.  Resolves the following issue:
    + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute
      arbitrary code via a negative bitmap_unit value that leads to a buffer
      overflow.  (Closes: #298939)
  * Update patch #076 (XPM library security fixes) to revert regressions in
    functionality caused by overly aggressive validation of filespec strings
    in OpenReadFile() and OpenWriteFile().  (Fixes #286164 for woody.)


stable/main/binary-mips/xterm_4.1.0-16woody6_mips.deb
stable/main/binary-mips/xvfb_4.1.0-16woody6_mips.deb
stable/main/binary-mips/twm_4.1.0-16woody6_mips.deb
stable/main/binary-mips/xlibmesa3-dbg_4.1.0-16woody6_mips.deb
stable/main/binary-mips/xdm_4.1.0-16woody6_mips.deb
stable/main/binary-mips/xlibmesa3_4.1.0-16woody6_mips.deb
stable/main/binary-mips/x-window-system-core_4.1.0-16woody6_mips.deb
stable/main/binary-mips/proxymngr_4.1.0-16woody6_mips.deb
stable/main/binary-mips/libxaw7-dev_4.1.0-16woody6_mips.deb
stable/main/binary-mips/xmh_4.1.0-16woody6_mips.deb
stable/main/binary-mips/xlibmesa-dev_4.1.0-16woody6_mips.deb
stable/main/binary-mips/libxaw6_4.1.0-16woody6_mips.deb
stable/main/binary-mips/libxaw7_4.1.0-16woody6_mips.deb
stable/main/binary-mips/libxaw6-dbg_4.1.0-16woody6_mips.deb
stable/main/binary-mips/xfwp_4.1.0-16woody6_mips.deb
stable/main/binary-mips/xlibs_4.1.0-16woody6_mips.deb
stable/main/binary-mips/xfs_4.1.0-16woody6_mips.deb
stable/main/binary-mips/libdps-dev_4.1.0-16woody6_mips.deb
stable/main/binary-mips/xlibs-pic_4.1.0-16woody6_mips.deb
stable/main/binary-mips/xserver-common_4.1.0-16woody6_mips.deb
stable/main/binary-mips/lbxproxy_4.1.0-16woody6_mips.deb
stable/main/binary-mips/xlibs-dbg_4.1.0-16woody6_mips.deb
stable/main/binary-mips/xutils_4.1.0-16woody6_mips.deb
stable/main/binary-mips/libdps1_4.1.0-16woody6_mips.deb
stable/main/binary-mips/xnest_4.1.0-16woody6_mips.deb
stable/main/binary-mips/xserver-xfree86_4.1.0-16woody6_mips.deb
stable/main/binary-mips/libxaw6-dev_4.1.0-16woody6_mips.deb
stable/main/binary-mips/libxaw7-dbg_4.1.0-16woody6_mips.deb
stable/main/binary-mips/libdps1-dbg_4.1.0-16woody6_mips.deb
stable/main/binary-mips/xbase-clients_4.1.0-16woody6_mips.deb
stable/main/binary-mips/xprt_4.1.0-16woody6_mips.deb
stable/main/binary-mips/xlibs-dev_4.1.0-16woody6_mips.deb
xfree86 (4.1.0-16woody6) stable-security; urgency=high
  * Security update release.  Resolves the following issue:
    + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute
      arbitrary code via a negative bitmap_unit value that leads to a buffer
      overflow.  (Closes: #298939)
  * Update patch #076 (XPM library security fixes) to revert regressions in
    functionality caused by overly aggressive validation of filespec strings
    in OpenReadFile() and OpenWriteFile().  (Fixes #286164 for woody.)


stable/main/binary-m68k/x-window-system-core_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/xbase-clients_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/xutils_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/xlibs-dbg_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/libdps1_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/xfwp_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/libdps-dev_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/xlibs-dev_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/xlibmesa3-dbg_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/libxaw7-dev_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/xlibs-pic_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/xserver-xfree86_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/xlibmesa3_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/xdm_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/xlibmesa-dev_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/libdps1-dbg_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/xterm_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/libxaw6-dbg_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/twm_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/xserver-common_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/lbxproxy_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/xvfb_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/libxaw6_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/xfs_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/xmh_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/libxaw7-dbg_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/libxaw6-dev_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/proxymngr_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/xprt_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/xnest_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/xlibs_4.1.0-16woody6_m68k.deb
stable/main/binary-m68k/libxaw7_4.1.0-16woody6_m68k.deb
xfree86 (4.1.0-16woody6) stable-security; urgency=high
  * Security update release.  Resolves the following issue:
    + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute
      arbitrary code via a negative bitmap_unit value that leads to a buffer
      overflow.  (Closes: #298939)
  * Update patch #076 (XPM library security fixes) to revert regressions in
    functionality caused by overly aggressive validation of filespec strings
    in OpenReadFile() and OpenWriteFile().  (Fixes #286164 for woody.)


stable/main/binary-ia64/xlibosmesa3-dbg_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xlibmesa3_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xvfb_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xbase-clients_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xserver-common_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/libdps-dev_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xlibs-dbg_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xdm_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/libxaw6-dev_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/libxaw7_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/libxaw7-dev_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xfs_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xlibmesa3-dbg_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xlibosmesa3_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xmh_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xterm_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xserver-xfree86_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/libxaw6_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xfwp_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xlibosmesa-dev_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xnest_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/x-window-system-core_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/lbxproxy_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xlibs-pic_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/libdps1-dbg_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/twm_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xutils_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xlibs-dev_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/proxymngr_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/libdps1_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xlibmesa-dev_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xprt_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/libxaw7-dbg_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/xlibs_4.1.0-16woody6_ia64.deb
stable/main/binary-ia64/libxaw6-dbg_4.1.0-16woody6_ia64.deb
xfree86 (4.1.0-16woody6) stable-security; urgency=high
  * Security update release.  Resolves the following issue:
    + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute
      arbitrary code via a negative bitmap_unit value that leads to a buffer
      overflow.  (Closes: #298939)
  * Update patch #076 (XPM library security fixes) to revert regressions in
    functionality caused by overly aggressive validation of filespec strings
    in OpenReadFile() and OpenWriteFile().  (Fixes #286164 for woody.)


stable/main/binary-i386/libxaw6-dbg_4.1.0-16woody6_i386.deb
stable/main/binary-i386/libxaw7_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xlibosmesa3_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xlibmesa-dev_4.1.0-16woody6_i386.deb
stable/main/binary-i386/libxaw7-dev_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xutils_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xlibmesa3-dbg_4.1.0-16woody6_i386.deb
stable/main/binary-i386/libdps1-dbg_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xlibs-dbg_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xvfb_4.1.0-16woody6_i386.deb
stable/main/binary-i386/libdps-dev_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xfs_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xfwp_4.1.0-16woody6_i386.deb
stable/main/binary-i386/libdps1_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xlibosmesa3-dbg_4.1.0-16woody6_i386.deb
stable/main/binary-i386/libxaw6_4.1.0-16woody6_i386.deb
stable/main/binary-i386/lbxproxy_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xbase-clients_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xmh_4.1.0-16woody6_i386.deb
stable/main/binary-i386/twm_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xserver-xfree86_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xprt_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xlibosmesa-dev_4.1.0-16woody6_i386.deb
stable/main/binary-i386/libxaw7-dbg_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xlibs-pic_4.1.0-16woody6_i386.deb
stable/main/binary-i386/x-window-system-core_4.1.0-16woody6_i386.deb
stable/main/binary-i386/proxymngr_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xnest_4.1.0-16woody6_i386.deb
stable/main/binary-i386/libxaw6-dev_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xlibmesa3_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xlibs-dev_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xdm_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xserver-common_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xterm_4.1.0-16woody6_i386.deb
stable/main/binary-i386/xlibs_4.1.0-16woody6_i386.deb
xfree86 (4.1.0-16woody6) stable-security; urgency=high
  * Security update release.  Resolves the following issue:
    + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute
      arbitrary code via a negative bitmap_unit value that leads to a buffer
      overflow.  (Closes: #298939)
  * Update patch #076 (XPM library security fixes) to revert regressions in
    functionality caused by overly aggressive validation of filespec strings
    in OpenReadFile() and OpenWriteFile().  (Fixes #286164 for woody.)


stable/main/binary-hppa/libdps-dev_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/xlibs_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/xlibs-dbg_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/xprt_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/xlibmesa3_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/xvfb_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/lbxproxy_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/libdps1_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/xserver-xfree86_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/libxaw7-dbg_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/libdps1-dbg_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/libxaw7_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/xserver-common_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/libxaw6_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/xfwp_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/xlibmesa3-dbg_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/xbase-clients_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/libxaw6-dev_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/twm_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/xlibmesa-dev_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/xterm_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/libxaw6-dbg_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/xmh_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/xutils_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/xdm_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/xnest_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/proxymngr_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/xlibs-dev_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/libxaw7-dev_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/x-window-system-core_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/xlibs-pic_4.1.0-16woody6_hppa.deb
stable/main/binary-hppa/xfs_4.1.0-16woody6_hppa.deb
xfree86 (4.1.0-16woody6) stable-security; urgency=high
  * Security update release.  Resolves the following issue:
    + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute
      arbitrary code via a negative bitmap_unit value that leads to a buffer
      overflow.  (Closes: #298939)
  * Update patch #076 (XPM library security fixes) to revert regressions in
    functionality caused by overly aggressive validation of filespec strings
    in OpenReadFile() and OpenWriteFile().  (Fixes #286164 for woody.)


stable/main/binary-arm/xnest_4.1.0-16woody6_arm.deb
stable/main/binary-arm/libxaw7-dbg_4.1.0-16woody6_arm.deb
stable/main/binary-arm/libxaw6-dbg_4.1.0-16woody6_arm.deb
stable/main/binary-arm/xutils_4.1.0-16woody6_arm.deb
stable/main/binary-arm/xserver-xfree86_4.1.0-16woody6_arm.deb
stable/main/binary-arm/x-window-system-core_4.1.0-16woody6_arm.deb
stable/main/binary-arm/xbase-clients_4.1.0-16woody6_arm.deb
stable/main/binary-arm/libxaw6_4.1.0-16woody6_arm.deb
stable/main/binary-arm/xserver-common_4.1.0-16woody6_arm.deb
stable/main/binary-arm/lbxproxy_4.1.0-16woody6_arm.deb
stable/main/binary-arm/xlibmesa-dev_4.1.0-16woody6_arm.deb
stable/main/binary-arm/xvfb_4.1.0-16woody6_arm.deb
stable/main/binary-arm/xlibs-dev_4.1.0-16woody6_arm.deb
stable/main/binary-arm/xlibs-pic_4.1.0-16woody6_arm.deb
stable/main/binary-arm/xlibmesa3-dbg_4.1.0-16woody6_arm.deb
stable/main/binary-arm/proxymngr_4.1.0-16woody6_arm.deb
stable/main/binary-arm/xdm_4.1.0-16woody6_arm.deb
stable/main/binary-arm/xlibs_4.1.0-16woody6_arm.deb
stable/main/binary-arm/libxaw7-dev_4.1.0-16woody6_arm.deb
stable/main/binary-arm/libxaw6-dev_4.1.0-16woody6_arm.deb
stable/main/binary-arm/xterm_4.1.0-16woody6_arm.deb
stable/main/binary-arm/xprt_4.1.0-16woody6_arm.deb
stable/main/binary-arm/xlibmesa3_4.1.0-16woody6_arm.deb
stable/main/binary-arm/libxaw7_4.1.0-16woody6_arm.deb
stable/main/binary-arm/xfs_4.1.0-16woody6_arm.deb
stable/main/binary-arm/libdps1-dbg_4.1.0-16woody6_arm.deb
stable/main/binary-arm/libdps1_4.1.0-16woody6_arm.deb
stable/main/binary-arm/twm_4.1.0-16woody6_arm.deb
stable/main/binary-arm/libdps-dev_4.1.0-16woody6_arm.deb
stable/main/binary-arm/xlibs-dbg_4.1.0-16woody6_arm.deb
stable/main/binary-arm/xmh_4.1.0-16woody6_arm.deb
stable/main/binary-arm/xfwp_4.1.0-16woody6_arm.deb
xfree86 (4.1.0-16woody6) stable-security; urgency=high
  * Security update release.  Resolves the following issue:
    + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute
      arbitrary code via a negative bitmap_unit value that leads to a buffer
      overflow.  (Closes: #298939)
  * Update patch #076 (XPM library security fixes) to revert regressions in
    functionality caused by overly aggressive validation of filespec strings
    in OpenReadFile() and OpenWriteFile().  (Fixes #286164 for woody.)


stable/main/binary-alpha/xvfb_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xlibosmesa3-dbg_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/libdps-dev_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/libxaw7-dbg_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xfs_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xlibs-dbg_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xlibmesa3_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xlibosmesa-dev_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/lbxproxy_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xlibosmesa3_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/libdps1_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xbase-clients_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/x-window-system-core_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xlibs-pic_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xmh_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xfwp_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/libdps1-dbg_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/libxaw6_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/twm_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xserver-xfree86_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xlibmesa3-dbg_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xnest_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/libxaw7-dev_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xutils_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xlibs-dev_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xlibs_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/libxaw7_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/libxaw6-dbg_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/libxaw6-dev_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xlibmesa-dev_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xserver-common_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xterm_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xdm_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/xprt_4.1.0-16woody6_alpha.deb
stable/main/binary-alpha/proxymngr_4.1.0-16woody6_alpha.deb
xfree86 (4.1.0-16woody6) stable-security; urgency=high
  * Security update release.  Resolves the following issue:
    + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute
      arbitrary code via a negative bitmap_unit value that leads to a buffer
      overflow.  (Closes: #298939)
  * Update patch #076 (XPM library security fixes) to revert regressions in
    functionality caused by overly aggressive validation of filespec strings
    in OpenReadFile() and OpenWriteFile().  (Fixes #286164 for woody.)


stable/main/binary-powerpc/xmh_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/proxymngr_4.1.0-16woody6_powerpc.deb
stable/main/binary-all/xspecs_4.1.0-16woody6_all.deb
stable/main/binary-powerpc/libxaw6_4.1.0-16woody6_powerpc.deb
stable/main/binary-all/xlib6g-dev_4.1.0-16woody6_all.deb
stable/main/binary-powerpc/xfwp_4.1.0-16woody6_powerpc.deb
stable/main/binary-all/xlib6g_4.1.0-16woody6_all.deb
stable/main/binary-all/xfonts-75dpi_4.1.0-16woody6_all.deb
stable/main/binary-powerpc/libdps1-dbg_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/libdps-dev_4.1.0-16woody6_powerpc.deb
stable/main/binary-all/xfonts-75dpi-transcoded_4.1.0-16woody6_all.deb
stable/main/binary-powerpc/libxaw7-dev_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/xserver-xfree86_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/libxaw6-dev_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/xlibmesa-dev_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/xlibmesa3_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/xlibs-dbg_4.1.0-16woody6_powerpc.deb
stable/main/binary-all/xfonts-base_4.1.0-16woody6_all.deb
stable/main/binary-powerpc/xserver-common_4.1.0-16woody6_powerpc.deb
stable/main/binary-all/xfonts-scalable_4.1.0-16woody6_all.deb
stable/main/binary-powerpc/xlibosmesa3-dbg_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/xlibs-dev_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/xfs_4.1.0-16woody6_powerpc.deb
stable/main/binary-all/xfonts-base-transcoded_4.1.0-16woody6_all.deb
stable/main/binary-powerpc/xutils_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/xprt_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/xlibosmesa-dev_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/x-window-system-core_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/xlibmesa3-dbg_4.1.0-16woody6_powerpc.deb
stable/main/binary-all/xfonts-cyrillic_4.1.0-16woody6_all.deb
stable/main/binary-powerpc/xdm_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/xlibs_4.1.0-16woody6_powerpc.deb
stable/main/binary-all/xfonts-100dpi-transcoded_4.1.0-16woody6_all.deb
stable/main/binary-all/xfonts-pex_4.1.0-16woody6_all.deb
stable/main/binary-all/xfree86-common_4.1.0-16woody6_all.deb
stable/main/binary-powerpc/xlibs-pic_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/xbase-clients_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/libxaw7-dbg_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/xnest_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/twm_4.1.0-16woody6_powerpc.deb
stable/main/binary-all/x-window-system_4.1.0-16woody6_all.deb
stable/main/binary-powerpc/lbxproxy_4.1.0-16woody6_powerpc.deb
stable/main/source/xfree86_4.1.0-16woody6.dsc
stable/main/binary-all/xfonts-100dpi_4.1.0-16woody6_all.deb
stable/main/binary-powerpc/xlibosmesa3_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/libxaw7_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/libdps1_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/libxaw6-dbg_4.1.0-16woody6_powerpc.deb
stable/main/binary-powerpc/xvfb_4.1.0-16woody6_powerpc.deb
stable/main/source/xfree86_4.1.0-16woody6.diff.gz
stable/main/binary-powerpc/xterm_4.1.0-16woody6_powerpc.deb
xfree86 (4.1.0-16woody6) stable-security; urgency=high
  * Security update release.  Resolves the following issue:
    + CAN-2005-0605: Xpm library's scan.c file may allow attackers to execute
      arbitrary code via a negative bitmap_unit value that leads to a buffer
      overflow.  (Closes: #298939)
  * Update patch #076 (XPM library security fixes) to revert regressions in
    functionality caused by overly aggressive validation of filespec strings
    in OpenReadFile() and OpenWriteFile().  (Fixes #286164 for woody.)


stable/main/binary-sparc/vim_6.1.018-1woody1_sparc.deb
stable/main/binary-sparc/vim-gtk_6.1.018-1woody1_sparc.deb
stable/main/binary-sparc/vim-perl_6.1.018-1woody1_sparc.deb
stable/main/binary-sparc/vim-tcl_6.1.018-1woody1_sparc.deb
stable/main/binary-sparc/vim-python_6.1.018-1woody1_sparc.deb
stable/main/binary-sparc/vim-ruby_6.1.018-1woody1_sparc.deb
vim (6.1.018-1woody1) stable; urgency=medium
  * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several
    vulnerabilities related to the use of options in modelines.
    (closes: #286223)
  * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create
    temporary files in vimspell.sh and tcltags. (closes: #289560, #291125)
  * Set maintainer address to project mailinglist on alioth and added myself to
    uploaders.


stable/main/binary-s390/vim-tcl_6.1.018-1woody1_s390.deb
stable/main/binary-s390/vim-perl_6.1.018-1woody1_s390.deb
stable/main/binary-s390/vim_6.1.018-1woody1_s390.deb
stable/main/binary-s390/vim-python_6.1.018-1woody1_s390.deb
stable/main/binary-s390/vim-gtk_6.1.018-1woody1_s390.deb
stable/main/binary-s390/vim-ruby_6.1.018-1woody1_s390.deb
vim (6.1.018-1woody1) stable; urgency=medium
  * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several
    vulnerabilities related to the use of options in modelines.
    (closes: #286223)
  * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create
    temporary files in vimspell.sh and tcltags. (closes: #289560, #291125)
  * Set maintainer address to project mailinglist on alioth and added myself to
    uploaders.


stable/main/binary-powerpc/vim-tcl_6.1.018-1woody1_powerpc.deb
stable/main/binary-powerpc/vim-perl_6.1.018-1woody1_powerpc.deb
stable/main/binary-powerpc/vim-python_6.1.018-1woody1_powerpc.deb
stable/main/binary-powerpc/vim-gtk_6.1.018-1woody1_powerpc.deb
stable/main/binary-powerpc/vim-ruby_6.1.018-1woody1_powerpc.deb
stable/main/binary-powerpc/vim_6.1.018-1woody1_powerpc.deb
vim (6.1.018-1woody1) stable; urgency=medium
  * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several
    vulnerabilities related to the use of options in modelines.
    (closes: #286223)
  * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create
    temporary files in vimspell.sh and tcltags. (closes: #289560, #291125)
  * Set maintainer address to project mailinglist on alioth and added myself to
    uploaders.


stable/main/binary-mipsel/vim_6.1.018-1woody1_mipsel.deb
stable/main/binary-mipsel/vim-ruby_6.1.018-1woody1_mipsel.deb
stable/main/binary-mipsel/vim-gtk_6.1.018-1woody1_mipsel.deb
stable/main/binary-mipsel/vim-python_6.1.018-1woody1_mipsel.deb
stable/main/binary-mipsel/vim-perl_6.1.018-1woody1_mipsel.deb
stable/main/binary-mipsel/vim-tcl_6.1.018-1woody1_mipsel.deb
vim (6.1.018-1woody1) stable; urgency=medium
  * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several
    vulnerabilities related to the use of options in modelines.
    (closes: #286223)
  * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create
    temporary files in vimspell.sh and tcltags. (closes: #289560, #291125)
  * Set maintainer address to project mailinglist on alioth and added myself to
    uploaders.


stable/main/binary-mips/vim-python_6.1.018-1woody1_mips.deb
stable/main/binary-mips/vim-gtk_6.1.018-1woody1_mips.deb
stable/main/binary-mips/vim-ruby_6.1.018-1woody1_mips.deb
stable/main/binary-mips/vim_6.1.018-1woody1_mips.deb
stable/main/binary-mips/vim-tcl_6.1.018-1woody1_mips.deb
stable/main/binary-mips/vim-perl_6.1.018-1woody1_mips.deb
vim (6.1.018-1woody1) stable; urgency=medium
  * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several
    vulnerabilities related to the use of options in modelines.
    (closes: #286223)
  * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create
    temporary files in vimspell.sh and tcltags. (closes: #289560, #291125)
  * Set maintainer address to project mailinglist on alioth and added myself to
    uploaders.


stable/main/binary-m68k/vim-gtk_6.1.018-1woody1_m68k.deb
stable/main/binary-m68k/vim-ruby_6.1.018-1woody1_m68k.deb
stable/main/binary-m68k/vim-python_6.1.018-1woody1_m68k.deb
stable/main/binary-m68k/vim-perl_6.1.018-1woody1_m68k.deb
stable/main/binary-m68k/vim-tcl_6.1.018-1woody1_m68k.deb
stable/main/binary-m68k/vim_6.1.018-1woody1_m68k.deb
vim (6.1.018-1woody1) stable; urgency=medium
  * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several
    vulnerabilities related to the use of options in modelines.
    (closes: #286223)
  * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create
    temporary files in vimspell.sh and tcltags. (closes: #289560, #291125)
  * Set maintainer address to project mailinglist on alioth and added myself to
    uploaders.


stable/main/binary-ia64/vim-perl_6.1.018-1woody1_ia64.deb
stable/main/binary-ia64/vim-tcl_6.1.018-1woody1_ia64.deb
stable/main/binary-ia64/vim-python_6.1.018-1woody1_ia64.deb
stable/main/binary-ia64/vim-gtk_6.1.018-1woody1_ia64.deb
stable/main/binary-ia64/vim_6.1.018-1woody1_ia64.deb
stable/main/binary-ia64/vim-ruby_6.1.018-1woody1_ia64.deb
vim (6.1.018-1woody1) stable; urgency=medium
  * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several
    vulnerabilities related to the use of options in modelines.
    (closes: #286223)
  * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create
    temporary files in vimspell.sh and tcltags. (closes: #289560, #291125)
  * Set maintainer address to project mailinglist on alioth and added myself to
    uploaders.


stable/main/binary-hppa/vim-ruby_6.1.018-1woody1_hppa.deb
stable/main/binary-hppa/vim-perl_6.1.018-1woody1_hppa.deb
stable/main/binary-hppa/vim-tcl_6.1.018-1woody1_hppa.deb
stable/main/binary-hppa/vim-python_6.1.018-1woody1_hppa.deb
stable/main/binary-hppa/vim_6.1.018-1woody1_hppa.deb
stable/main/binary-hppa/vim-gtk_6.1.018-1woody1_hppa.deb
vim (6.1.018-1woody1) stable; urgency=medium
  * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several
    vulnerabilities related to the use of options in modelines.
    (closes: #286223)
  * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create
    temporary files in vimspell.sh and tcltags. (closes: #289560, #291125)
  * Set maintainer address to project mailinglist on alioth and added myself to
    uploaders.


stable/main/binary-arm/vim-python_6.1.018-1woody1_arm.deb
stable/main/binary-arm/vim-tcl_6.1.018-1woody1_arm.deb
stable/main/binary-arm/vim-gtk_6.1.018-1woody1_arm.deb
stable/main/binary-arm/vim_6.1.018-1woody1_arm.deb
stable/main/binary-arm/vim-perl_6.1.018-1woody1_arm.deb
stable/main/binary-arm/vim-ruby_6.1.018-1woody1_arm.deb
vim (6.1.018-1woody1) stable; urgency=medium
  * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several
    vulnerabilities related to the use of options in modelines.
    (closes: #286223)
  * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create
    temporary files in vimspell.sh and tcltags. (closes: #289560, #291125)
  * Set maintainer address to project mailinglist on alioth and added myself to
    uploaders.


stable/main/binary-alpha/vim-python_6.1.018-1woody1_alpha.deb
stable/main/binary-alpha/vim-ruby_6.1.018-1woody1_alpha.deb
stable/main/binary-alpha/vim_6.1.018-1woody1_alpha.deb
stable/main/binary-alpha/vim-tcl_6.1.018-1woody1_alpha.deb
stable/main/binary-alpha/vim-gtk_6.1.018-1woody1_alpha.deb
stable/main/binary-alpha/vim-perl_6.1.018-1woody1_alpha.deb
vim (6.1.018-1woody1) stable; urgency=medium
  * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several
    vulnerabilities related to the use of options in modelines.
    (closes: #286223)
  * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create
    temporary files in vimspell.sh and tcltags. (closes: #289560, #291125)
  * Set maintainer address to project mailinglist on alioth and added myself to
    uploaders.


stable/main/binary-i386/vim-perl_6.1.018-1woody1_i386.deb
stable/main/binary-i386/vim-tcl_6.1.018-1woody1_i386.deb
stable/main/source/vim_6.1.018-1woody1.diff.gz
stable/main/binary-i386/vim_6.1.018-1woody1_i386.deb
stable/main/binary-i386/vim-ruby_6.1.018-1woody1_i386.deb
stable/main/binary-i386/vim-gtk_6.1.018-1woody1_i386.deb
stable/main/binary-i386/vim-python_6.1.018-1woody1_i386.deb
stable/main/source/vim_6.1.018.orig.tar.gz
stable/main/source/vim_6.1.018-1woody1.dsc
vim (6.1.018-1woody1) stable; urgency=medium
  * CAN-2004-1138: Backported and applied patch 6.3.045 which fixes several
    vulnerabilities related to the use of options in modelines.
    (closes: #286223)
  * CAN-2005-0069: Use mktemp instead of insecure $$ construction to create
    temporary files in vimspell.sh and tcltags. (closes: #289560, #291125)
  * Set maintainer address to project mailinglist on alioth and added myself to
    uploaders.


stable/main/binary-sparc/ssmtp_2.50.6.3_sparc.deb
ssmtp (2.50.6.3) stable; urgency=medium
  * Reapplied patch to version 2.50.6.1.
    Fixes security RC bug "ssmtp mangles messages in transit" found
    by Michelle Konzack <linux4michelle@freenet.de>, closes: #298054.
    Patch by Jeff King <peff-junk@peff.net>.


stable/main/binary-s390/ssmtp_2.50.6.3_s390.deb
ssmtp (2.50.6.3) stable; urgency=medium
  * Reapplied patch to version 2.50.6.1.
    Fixes security RC bug "ssmtp mangles messages in transit" found
    by Michelle Konzack <linux4michelle@freenet.de>, closes: #298054.
    Patch by Jeff King <peff-junk@peff.net>.


stable/main/binary-powerpc/ssmtp_2.50.6.3_powerpc.deb
ssmtp (2.50.6.3) stable; urgency=medium
  * Reapplied patch to version 2.50.6.1.
    Fixes security RC bug "ssmtp mangles messages in transit" found
    by Michelle Konzack <linux4michelle@freenet.de>, closes: #298054.
    Patch by Jeff King <peff-junk@peff.net>.


stable/main/binary-mipsel/ssmtp_2.50.6.3_mipsel.deb
ssmtp (2.50.6.3) stable; urgency=medium
  * Reapplied patch to version 2.50.6.1.
    Fixes security RC bug "ssmtp mangles messages in transit" found
    by Michelle Konzack <linux4michelle@freenet.de>, closes: #298054.
    Patch by Jeff King <peff-junk@peff.net>.


stable/main/binary-mips/ssmtp_2.50.6.3_mips.deb
ssmtp (2.50.6.3) stable; urgency=medium
  * Reapplied patch to version 2.50.6.1.
    Fixes security RC bug "ssmtp mangles messages in transit" found
    by Michelle Konzack <linux4michelle@freenet.de>, closes: #298054.
    Patch by Jeff King <peff-junk@peff.net>.


stable/main/binary-m68k/ssmtp_2.50.6.3_m68k.deb
ssmtp (2.50.6.3) stable; urgency=medium
  * Reapplied patch to version 2.50.6.1.
    Fixes security RC bug "ssmtp mangles messages in transit" found
    by Michelle Konzack <linux4michelle@freenet.de>, closes: #298054.
    Patch by Jeff King <peff-junk@peff.net>.


stable/main/binary-ia64/ssmtp_2.50.6.3_ia64.deb
ssmtp (2.50.6.3) stable; urgency=medium
  * Reapplied patch to version 2.50.6.1.
    Fixes security RC bug "ssmtp mangles messages in transit" found
    by Michelle Konzack <linux4michelle@freenet.de>, closes: #298054.
    Patch by Jeff King <peff-junk@peff.net>.


stable/main/binary-hppa/ssmtp_2.50.6.3_hppa.deb
ssmtp (2.50.6.3) stable; urgency=medium
  * Reapplied patch to version 2.50.6.1.
    Fixes security RC bug "ssmtp mangles messages in transit" found
    by Michelle Konzack <linux4michelle@freenet.de>, closes: #298054.
    Patch by Jeff King <peff-junk@peff.net>.


stable/main/binary-arm/ssmtp_2.50.6.3_arm.deb
ssmtp (2.50.6.3) stable; urgency=medium
  * Reapplied patch to version 2.50.6.1.
    Fixes security RC bug "ssmtp mangles messages in transit" found
    by Michelle Konzack <linux4michelle@freenet.de>, closes: #298054.
    Patch by Jeff King <peff-junk@peff.net>.


stable/main/binary-alpha/ssmtp_2.50.6.3_alpha.deb
ssmtp (2.50.6.3) stable; urgency=medium
  * Reapplied patch to version 2.50.6.1.
    Fixes security RC bug "ssmtp mangles messages in transit" found
    by Michelle Konzack <linux4michelle@freenet.de>, closes: #298054.
    Patch by Jeff King <peff-junk@peff.net>.


stable/main/source/ssmtp_2.50.6.3.dsc
stable/main/source/ssmtp_2.50.6.3.tar.gz
stable/main/binary-i386/ssmtp_2.50.6.3_i386.deb
ssmtp (2.50.6.3) stable; urgency=medium
  * Reapplied patch to version 2.50.6.1.
    Fixes security RC bug "ssmtp mangles messages in transit" found
    by Michelle Konzack <linux4michelle@freenet.de>, closes: #298054.
    Patch by Jeff King <peff-junk@peff.net>.


stable/main/binary-sparc/squid-cgi_2.4.6-2woody8_sparc.deb
stable/main/binary-sparc/squidclient_2.4.6-2woody8_sparc.deb
stable/main/binary-sparc/squid_2.4.6-2woody8_sparc.deb
squid (2.4.6-2woody8) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for missing checks on incomplete ACLs
    o squid-2.5.STABLE9-acl_error.patch
    o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345


stable/main/binary-s390/squid-cgi_2.4.6-2woody8_s390.deb
stable/main/binary-s390/squidclient_2.4.6-2woody8_s390.deb
stable/main/binary-s390/squid_2.4.6-2woody8_s390.deb
squid (2.4.6-2woody8) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for missing checks on incomplete ACLs
    o squid-2.5.STABLE9-acl_error.patch
    o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345


stable/main/binary-powerpc/squid-cgi_2.4.6-2woody8_powerpc.deb
stable/main/binary-powerpc/squid_2.4.6-2woody8_powerpc.deb
stable/main/binary-powerpc/squidclient_2.4.6-2woody8_powerpc.deb
squid (2.4.6-2woody8) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for missing checks on incomplete ACLs
    o squid-2.5.STABLE9-acl_error.patch
    o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345


stable/main/binary-mipsel/squid_2.4.6-2woody8_mipsel.deb
stable/main/binary-mipsel/squidclient_2.4.6-2woody8_mipsel.deb
stable/main/binary-mipsel/squid-cgi_2.4.6-2woody8_mipsel.deb
squid (2.4.6-2woody8) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for missing checks on incomplete ACLs
    o squid-2.5.STABLE9-acl_error.patch
    o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345


stable/main/binary-mips/squid-cgi_2.4.6-2woody8_mips.deb
stable/main/binary-mips/squid_2.4.6-2woody8_mips.deb
stable/main/binary-mips/squidclient_2.4.6-2woody8_mips.deb
squid (2.4.6-2woody8) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for missing checks on incomplete ACLs
    o squid-2.5.STABLE9-acl_error.patch
    o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345


stable/main/binary-m68k/squid-cgi_2.4.6-2woody8_m68k.deb
stable/main/binary-m68k/squidclient_2.4.6-2woody8_m68k.deb
stable/main/binary-m68k/squid_2.4.6-2woody8_m68k.deb
squid (2.4.6-2woody8) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for missing checks on incomplete ACLs
    o squid-2.5.STABLE9-acl_error.patch
    o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345


stable/main/binary-ia64/squid_2.4.6-2woody8_ia64.deb
stable/main/binary-ia64/squidclient_2.4.6-2woody8_ia64.deb
stable/main/binary-ia64/squid-cgi_2.4.6-2woody8_ia64.deb
squid (2.4.6-2woody8) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for missing checks on incomplete ACLs
    o squid-2.5.STABLE9-acl_error.patch
    o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345


stable/main/binary-hppa/squid-cgi_2.4.6-2woody8_hppa.deb
stable/main/binary-hppa/squid_2.4.6-2woody8_hppa.deb
stable/main/binary-hppa/squidclient_2.4.6-2woody8_hppa.deb
squid (2.4.6-2woody8) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for missing checks on incomplete ACLs
    o squid-2.5.STABLE9-acl_error.patch
    o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345


stable/main/binary-arm/squidclient_2.4.6-2woody8_arm.deb
stable/main/binary-arm/squid_2.4.6-2woody8_arm.deb
stable/main/binary-arm/squid-cgi_2.4.6-2woody8_arm.deb
squid (2.4.6-2woody8) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for missing checks on incomplete ACLs
    o squid-2.5.STABLE9-acl_error.patch
    o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345


stable/main/binary-alpha/squid-cgi_2.4.6-2woody8_alpha.deb
stable/main/binary-alpha/squidclient_2.4.6-2woody8_alpha.deb
stable/main/binary-alpha/squid_2.4.6-2woody8_alpha.deb
squid (2.4.6-2woody8) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for missing checks on incomplete ACLs
    o squid-2.5.STABLE9-acl_error.patch
    o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345


stable/main/binary-i386/squidclient_2.4.6-2woody8_i386.deb
stable/main/source/squid_2.4.6-2woody8.diff.gz
stable/main/binary-i386/squid_2.4.6-2woody8_i386.deb
stable/main/source/squid_2.4.6-2woody8.dsc
stable/main/binary-i386/squid-cgi_2.4.6-2woody8_i386.deb
squid (2.4.6-2woody8) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for missing checks on incomplete ACLs
    o squid-2.5.STABLE9-acl_error.patch
    o src/acl.c, src/cache_cf.c, src/tools.c, CAN-2005-1345


stable/main/binary-sparc/smartlist_3.15-5.woody.1_sparc.deb
smartlist (3.15-5.woody.1) stable-security; urgency=low
  * Fixed dangerous use of multigram in the subscribing code. A valid cookie
    could be used to subscribe an address which is not the one in the cookie.
    This is CAN-2005-0157.


stable/main/binary-s390/smartlist_3.15-5.woody.1_s390.deb
smartlist (3.15-5.woody.1) stable-security; urgency=low
  * Fixed dangerous use of multigram in the subscribing code. A valid cookie
    could be used to subscribe an address which is not the one in the cookie.
    This is CAN-2005-0157.


stable/main/binary-powerpc/smartlist_3.15-5.woody.1_powerpc.deb
smartlist (3.15-5.woody.1) stable-security; urgency=low
  * Fixed dangerous use of multigram in the subscribing code. A valid cookie
    could be used to subscribe an address which is not the one in the cookie.
    This is CAN-2005-0157.


stable/main/binary-mipsel/smartlist_3.15-5.woody.1_mipsel.deb
smartlist (3.15-5.woody.1) stable-security; urgency=low
  * Fixed dangerous use of multigram in the subscribing code. A valid cookie
    could be used to subscribe an address which is not the one in the cookie.
    This is CAN-2005-0157.


stable/main/binary-mips/smartlist_3.15-5.woody.1_mips.deb
smartlist (3.15-5.woody.1) stable-security; urgency=low
  * Fixed dangerous use of multigram in the subscribing code. A valid cookie
    could be used to subscribe an address which is not the one in the cookie.
    This is CAN-2005-0157.


stable/main/binary-m68k/smartlist_3.15-5.woody.1_m68k.deb
smartlist (3.15-5.woody.1) stable-security; urgency=low
  * Fixed dangerous use of multigram in the subscribing code. A valid cookie
    could be used to subscribe an address which is not the one in the cookie.
    This is CAN-2005-0157.


stable/main/binary-ia64/smartlist_3.15-5.woody.1_ia64.deb
smartlist (3.15-5.woody.1) stable-security; urgency=low
  * Fixed dangerous use of multigram in the subscribing code. A valid cookie
    could be used to subscribe an address which is not the one in the cookie.
    This is CAN-2005-0157.


stable/main/binary-hppa/smartlist_3.15-5.woody.1_hppa.deb
smartlist (3.15-5.woody.1) stable-security; urgency=low
  * Fixed dangerous use of multigram in the subscribing code. A valid cookie
    could be used to subscribe an address which is not the one in the cookie.
    This is CAN-2005-0157.


stable/main/binary-arm/smartlist_3.15-5.woody.1_arm.deb
smartlist (3.15-5.woody.1) stable-security; urgency=low
  * Fixed dangerous use of multigram in the subscribing code. A valid cookie
    could be used to subscribe an address which is not the one in the cookie.
    This is CAN-2005-0157.


stable/main/binary-alpha/smartlist_3.15-5.woody.1_alpha.deb
smartlist (3.15-5.woody.1) stable-security; urgency=low
  * Fixed dangerous use of multigram in the subscribing code. A valid cookie
    could be used to subscribe an address which is not the one in the cookie.
    This is CAN-2005-0157.


stable/main/binary-i386/smartlist_3.15-5.woody.1_i386.deb
stable/main/source/smartlist_3.15-5.woody.1.dsc
stable/main/source/smartlist_3.15-5.woody.1.diff.gz
smartlist (3.15-5.woody.1) stable-security; urgency=low
  * Fixed dangerous use of multigram in the subscribing code. A valid cookie
    could be used to subscribe an address which is not the one in the cookie.
    This is CAN-2005-0157.


stable/main/binary-sparc/smail_3.2.0.114-4woody1_sparc.deb
smail (3.2.0.114-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from the discoverer to fix a buffer overflow
    [src/addr.c, CAN-2005-0892]


stable/main/binary-s390/smail_3.2.0.114-4woody1_s390.deb
smail (3.2.0.114-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from the discoverer to fix a buffer overflow
    [src/addr.c, CAN-2005-0892]


stable/main/binary-powerpc/smail_3.2.0.114-4woody1_powerpc.deb
smail (3.2.0.114-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from the discoverer to fix a buffer overflow
    [src/addr.c, CAN-2005-0892]


stable/main/binary-mipsel/smail_3.2.0.114-4woody1_mipsel.deb
smail (3.2.0.114-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from the discoverer to fix a buffer overflow
    [src/addr.c, CAN-2005-0892]


stable/main/binary-mips/smail_3.2.0.114-4woody1_mips.deb
smail (3.2.0.114-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from the discoverer to fix a buffer overflow
    [src/addr.c, CAN-2005-0892]


stable/main/binary-m68k/smail_3.2.0.114-4woody1_m68k.deb
smail (3.2.0.114-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from the discoverer to fix a buffer overflow
    [src/addr.c, CAN-2005-0892]


stable/main/binary-ia64/smail_3.2.0.114-4woody1_ia64.deb
smail (3.2.0.114-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from the discoverer to fix a buffer overflow
    [src/addr.c, CAN-2005-0892]


stable/main/binary-hppa/smail_3.2.0.114-4woody1_hppa.deb
smail (3.2.0.114-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from the discoverer to fix a buffer overflow
    [src/addr.c, CAN-2005-0892]


stable/main/binary-arm/smail_3.2.0.114-4woody1_arm.deb
smail (3.2.0.114-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from the discoverer to fix a buffer overflow
    [src/addr.c, CAN-2005-0892]


stable/main/binary-alpha/smail_3.2.0.114-4woody1_alpha.deb
smail (3.2.0.114-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from the discoverer to fix a buffer overflow
    [src/addr.c, CAN-2005-0892]


stable/main/binary-i386/smail_3.2.0.114-4woody1_i386.deb
stable/main/source/smail_3.2.0.114-4woody1.dsc
stable/main/source/smail_3.2.0.114-4woody1.diff.gz
smail (3.2.0.114-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from the discoverer to fix a buffer overflow
    [src/addr.c, CAN-2005-0892]


stable/main/binary-sparc/swat_2.2.3a-15_sparc.deb
stable/main/binary-sparc/winbind_2.2.3a-15_sparc.deb
stable/main/binary-sparc/samba-common_2.2.3a-15_sparc.deb
stable/main/binary-sparc/libsmbclient-dev_2.2.3a-15_sparc.deb
stable/main/binary-sparc/smbclient_2.2.3a-15_sparc.deb
stable/main/binary-sparc/libpam-smbpass_2.2.3a-15_sparc.deb
stable/main/binary-sparc/libsmbclient_2.2.3a-15_sparc.deb
stable/main/binary-sparc/samba_2.2.3a-15_sparc.deb
stable/main/binary-sparc/smbfs_2.2.3a-15_sparc.deb
samba (2.2.3a-15) stable-security; urgency=medium
  * Acknowledge the Security Team's NMUs; thanks again for all your
    work, Joey.
  * Fix a rounding error introduced in the patch to bitmap_alloc() that
    causes crashes on reload.  Closes: #302378. [src/bitmap.c]


stable/main/binary-s390/smbclient_2.2.3a-15_s390.deb
stable/main/binary-s390/samba_2.2.3a-15_s390.deb
stable/main/binary-s390/samba-common_2.2.3a-15_s390.deb
stable/main/binary-s390/libpam-smbpass_2.2.3a-15_s390.deb
stable/main/binary-s390/libsmbclient_2.2.3a-15_s390.deb
stable/main/binary-s390/libsmbclient-dev_2.2.3a-15_s390.deb
stable/main/binary-s390/swat_2.2.3a-15_s390.deb
stable/main/binary-s390/winbind_2.2.3a-15_s390.deb
stable/main/binary-s390/smbfs_2.2.3a-15_s390.deb
samba (2.2.3a-15) stable-security; urgency=medium
  * Acknowledge the Security Team's NMUs; thanks again for all your
    work, Joey.
  * Fix a rounding error introduced in the patch to bitmap_alloc() that
    causes crashes on reload.  Closes: #302378. [src/bitmap.c]


stable/main/binary-powerpc/winbind_2.2.3a-15_powerpc.deb
stable/main/binary-powerpc/samba_2.2.3a-15_powerpc.deb
stable/main/binary-powerpc/libpam-smbpass_2.2.3a-15_powerpc.deb
stable/main/binary-powerpc/samba-common_2.2.3a-15_powerpc.deb
stable/main/binary-powerpc/libsmbclient_2.2.3a-15_powerpc.deb
stable/main/binary-powerpc/smbclient_2.2.3a-15_powerpc.deb
stable/main/binary-powerpc/swat_2.2.3a-15_powerpc.deb
stable/main/binary-powerpc/libsmbclient-dev_2.2.3a-15_powerpc.deb
stable/main/binary-powerpc/smbfs_2.2.3a-15_powerpc.deb
samba (2.2.3a-15) stable-security; urgency=medium
  * Acknowledge the Security Team's NMUs; thanks again for all your
    work, Joey.
  * Fix a rounding error introduced in the patch to bitmap_alloc() that
    causes crashes on reload.  Closes: #302378. [src/bitmap.c]


stable/main/binary-mipsel/smbfs_2.2.3a-15_mipsel.deb
stable/main/binary-mipsel/samba-common_2.2.3a-15_mipsel.deb
stable/main/binary-mipsel/smbclient_2.2.3a-15_mipsel.deb
stable/main/binary-mipsel/libsmbclient-dev_2.2.3a-15_mipsel.deb
stable/main/binary-mipsel/swat_2.2.3a-15_mipsel.deb
stable/main/binary-mipsel/libsmbclient_2.2.3a-15_mipsel.deb
stable/main/binary-mipsel/libpam-smbpass_2.2.3a-15_mipsel.deb
stable/main/binary-mipsel/winbind_2.2.3a-15_mipsel.deb
stable/main/binary-mipsel/samba_2.2.3a-15_mipsel.deb
samba (2.2.3a-15) stable-security; urgency=medium
  * Acknowledge the Security Team's NMUs; thanks again for all your
    work, Joey.
  * Fix a rounding error introduced in the patch to bitmap_alloc() that
    causes crashes on reload.  Closes: #302378. [src/bitmap.c]


stable/main/binary-mips/swat_2.2.3a-15_mips.deb
stable/main/binary-mips/smbfs_2.2.3a-15_mips.deb
stable/main/binary-mips/samba-common_2.2.3a-15_mips.deb
stable/main/binary-mips/libsmbclient_2.2.3a-15_mips.deb
stable/main/binary-mips/libsmbclient-dev_2.2.3a-15_mips.deb
stable/main/binary-mips/smbclient_2.2.3a-15_mips.deb
stable/main/binary-mips/winbind_2.2.3a-15_mips.deb
stable/main/binary-mips/libpam-smbpass_2.2.3a-15_mips.deb
stable/main/binary-mips/samba_2.2.3a-15_mips.deb
samba (2.2.3a-15) stable-security; urgency=medium
  * Acknowledge the Security Team's NMUs; thanks again for all your
    work, Joey.
  * Fix a rounding error introduced in the patch to bitmap_alloc() that
    causes crashes on reload.  Closes: #302378. [src/bitmap.c]


stable/main/binary-m68k/winbind_2.2.3a-15_m68k.deb
stable/main/binary-m68k/libsmbclient-dev_2.2.3a-15_m68k.deb
stable/main/binary-m68k/samba-common_2.2.3a-15_m68k.deb
stable/main/binary-m68k/libsmbclient_2.2.3a-15_m68k.deb
stable/main/binary-m68k/smbclient_2.2.3a-15_m68k.deb
stable/main/binary-m68k/smbfs_2.2.3a-15_m68k.deb
stable/main/binary-m68k/swat_2.2.3a-15_m68k.deb
stable/main/binary-m68k/samba_2.2.3a-15_m68k.deb
stable/main/binary-m68k/libpam-smbpass_2.2.3a-15_m68k.deb
samba (2.2.3a-15) stable-security; urgency=medium
  * Acknowledge the Security Team's NMUs; thanks again for all your
    work, Joey.
  * Fix a rounding error introduced in the patch to bitmap_alloc() that
    causes crashes on reload.  Closes: #302378. [src/bitmap.c]


stable/main/binary-ia64/smbclient_2.2.3a-15_ia64.deb
stable/main/binary-ia64/smbfs_2.2.3a-15_ia64.deb
stable/main/binary-ia64/samba_2.2.3a-15_ia64.deb
stable/main/binary-ia64/libpam-smbpass_2.2.3a-15_ia64.deb
stable/main/binary-ia64/libsmbclient_2.2.3a-15_ia64.deb
stable/main/binary-ia64/libsmbclient-dev_2.2.3a-15_ia64.deb
stable/main/binary-ia64/swat_2.2.3a-15_ia64.deb
stable/main/binary-ia64/winbind_2.2.3a-15_ia64.deb
stable/main/binary-ia64/samba-common_2.2.3a-15_ia64.deb
samba (2.2.3a-15) stable-security; urgency=medium
  * Acknowledge the Security Team's NMUs; thanks again for all your
    work, Joey.
  * Fix a rounding error introduced in the patch to bitmap_alloc() that
    causes crashes on reload.  Closes: #302378. [src/bitmap.c]


stable/main/binary-i386/samba_2.2.3a-15_i386.deb
stable/main/binary-i386/winbind_2.2.3a-15_i386.deb
stable/main/binary-i386/libsmbclient_2.2.3a-15_i386.deb
stable/main/binary-i386/swat_2.2.3a-15_i386.deb
stable/main/binary-i386/libsmbclient-dev_2.2.3a-15_i386.deb
stable/main/binary-i386/libpam-smbpass_2.2.3a-15_i386.deb
stable/main/binary-i386/samba-common_2.2.3a-15_i386.deb
stable/main/binary-i386/smbclient_2.2.3a-15_i386.deb
stable/main/binary-i386/smbfs_2.2.3a-15_i386.deb
samba (2.2.3a-15) stable-security; urgency=medium
  * Acknowledge the Security Team's NMUs; thanks again for all your
    work, Joey.
  * Fix a rounding error introduced in the patch to bitmap_alloc() that
    causes crashes on reload.  Closes: #302378. [src/bitmap.c]


stable/main/binary-hppa/swat_2.2.3a-15_hppa.deb
stable/main/binary-hppa/libsmbclient_2.2.3a-15_hppa.deb
stable/main/binary-hppa/samba_2.2.3a-15_hppa.deb
stable/main/binary-hppa/smbfs_2.2.3a-15_hppa.deb
stable/main/binary-hppa/libpam-smbpass_2.2.3a-15_hppa.deb
stable/main/binary-hppa/libsmbclient-dev_2.2.3a-15_hppa.deb
stable/main/binary-hppa/samba-common_2.2.3a-15_hppa.deb
stable/main/binary-hppa/smbclient_2.2.3a-15_hppa.deb
stable/main/binary-hppa/winbind_2.2.3a-15_hppa.deb
samba (2.2.3a-15) stable-security; urgency=medium
  * Acknowledge the Security Team's NMUs; thanks again for all your
    work, Joey.
  * Fix a rounding error introduced in the patch to bitmap_alloc() that
    causes crashes on reload.  Closes: #302378. [src/bitmap.c]


stable/main/binary-alpha/smbclient_2.2.3a-15_alpha.deb
stable/main/binary-alpha/smbfs_2.2.3a-15_alpha.deb
stable/main/binary-alpha/libsmbclient-dev_2.2.3a-15_alpha.deb
stable/main/binary-alpha/libpam-smbpass_2.2.3a-15_alpha.deb
stable/main/binary-alpha/samba_2.2.3a-15_alpha.deb
stable/main/binary-alpha/winbind_2.2.3a-15_alpha.deb
stable/main/binary-alpha/libsmbclient_2.2.3a-15_alpha.deb
stable/main/binary-alpha/swat_2.2.3a-15_alpha.deb
stable/main/binary-alpha/samba-common_2.2.3a-15_alpha.deb
samba (2.2.3a-15) stable-security; urgency=medium
  * Acknowledge the Security Team's NMUs; thanks again for all your
    work, Joey.
  * Fix a rounding error introduced in the patch to bitmap_alloc() that
    causes crashes on reload.  Closes: #302378. [src/bitmap.c]


stable/main/binary-arm/smbclient_2.2.3a-15_arm.deb
stable/main/binary-arm/samba_2.2.3a-15_arm.deb
stable/main/binary-arm/samba-common_2.2.3a-15_arm.deb
stable/main/source/samba_2.2.3a-15.diff.gz
stable/main/binary-arm/swat_2.2.3a-15_arm.deb
stable/main/binary-arm/libsmbclient_2.2.3a-15_arm.deb
stable/main/binary-arm/libsmbclient-dev_2.2.3a-15_arm.deb
stable/main/binary-arm/libpam-smbpass_2.2.3a-15_arm.deb
stable/main/binary-arm/smbfs_2.2.3a-15_arm.deb
stable/main/binary-arm/winbind_2.2.3a-15_arm.deb
stable/main/source/samba_2.2.3a-15.dsc
stable/main/binary-all/samba-doc_2.2.3a-15_all.deb
samba (2.2.3a-15) stable-security; urgency=medium
  * Acknowledge the Security Team's NMUs; thanks again for all your
    work, Joey.
  * Fix a rounding error introduced in the patch to bitmap_alloc() that
    causes crashes on reload.  Closes: #302378. [src/bitmap.c]


stable/main/binary-sparc/qpopper_4.0.4-2.woody.5_sparc.deb
stable/main/binary-sparc/qpopper-drac_4.0.4-2.woody.5_sparc.deb
qpopper (4.0.4-2.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix unauthorised file read access
    [popper/pop_config.c, CAN-2005-1151]
  * Backported upstream patch to fix unauthorised file write access
    [popper/popauth.c, CAN-2005-1151]
  * Applied upstream patch to ensure that no group- or world-readable
    files are created [popper/popauth.c, CAN-2005-1152]


stable/main/binary-s390/qpopper_4.0.4-2.woody.5_s390.deb
stable/main/binary-s390/qpopper-drac_4.0.4-2.woody.5_s390.deb
qpopper (4.0.4-2.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix unauthorised file read access
    [popper/pop_config.c, CAN-2005-1151]
  * Backported upstream patch to fix unauthorised file write access
    [popper/popauth.c, CAN-2005-1151]
  * Applied upstream patch to ensure that no group- or world-readable
    files are created [popper/popauth.c, CAN-2005-1152]


stable/main/binary-powerpc/qpopper_4.0.4-2.woody.5_powerpc.deb
stable/main/binary-powerpc/qpopper-drac_4.0.4-2.woody.5_powerpc.deb
qpopper (4.0.4-2.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix unauthorised file read access
    [popper/pop_config.c, CAN-2005-1151]
  * Backported upstream patch to fix unauthorised file write access
    [popper/popauth.c, CAN-2005-1151]
  * Applied upstream patch to ensure that no group- or world-readable
    files are created [popper/popauth.c, CAN-2005-1152]


stable/main/binary-mipsel/qpopper_4.0.4-2.woody.5_mipsel.deb
stable/main/binary-mipsel/qpopper-drac_4.0.4-2.woody.5_mipsel.deb
qpopper (4.0.4-2.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix unauthorised file read access
    [popper/pop_config.c, CAN-2005-1151]
  * Backported upstream patch to fix unauthorised file write access
    [popper/popauth.c, CAN-2005-1151]
  * Applied upstream patch to ensure that no group- or world-readable
    files are created [popper/popauth.c, CAN-2005-1152]


stable/main/binary-mips/qpopper_4.0.4-2.woody.5_mips.deb
stable/main/binary-mips/qpopper-drac_4.0.4-2.woody.5_mips.deb
qpopper (4.0.4-2.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix unauthorised file read access
    [popper/pop_config.c, CAN-2005-1151]
  * Backported upstream patch to fix unauthorised file write access
    [popper/popauth.c, CAN-2005-1151]
  * Applied upstream patch to ensure that no group- or world-readable
    files are created [popper/popauth.c, CAN-2005-1152]


stable/main/binary-m68k/qpopper-drac_4.0.4-2.woody.5_m68k.deb
stable/main/binary-m68k/qpopper_4.0.4-2.woody.5_m68k.deb
qpopper (4.0.4-2.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix unauthorised file read access
    [popper/pop_config.c, CAN-2005-1151]
  * Backported upstream patch to fix unauthorised file write access
    [popper/popauth.c, CAN-2005-1151]
  * Applied upstream patch to ensure that no group- or world-readable
    files are created [popper/popauth.c, CAN-2005-1152]


stable/main/binary-ia64/qpopper_4.0.4-2.woody.5_ia64.deb
stable/main/binary-ia64/qpopper-drac_4.0.4-2.woody.5_ia64.deb
qpopper (4.0.4-2.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix unauthorised file read access
    [popper/pop_config.c, CAN-2005-1151]
  * Backported upstream patch to fix unauthorised file write access
    [popper/popauth.c, CAN-2005-1151]
  * Applied upstream patch to ensure that no group- or world-readable
    files are created [popper/popauth.c, CAN-2005-1152]


stable/main/binary-hppa/qpopper_4.0.4-2.woody.5_hppa.deb
stable/main/binary-hppa/qpopper-drac_4.0.4-2.woody.5_hppa.deb
qpopper (4.0.4-2.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix unauthorised file read access
    [popper/pop_config.c, CAN-2005-1151]
  * Backported upstream patch to fix unauthorised file write access
    [popper/popauth.c, CAN-2005-1151]
  * Applied upstream patch to ensure that no group- or world-readable
    files are created [popper/popauth.c, CAN-2005-1152]


stable/main/binary-arm/qpopper-drac_4.0.4-2.woody.5_arm.deb
stable/main/binary-arm/qpopper_4.0.4-2.woody.5_arm.deb
qpopper (4.0.4-2.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix unauthorised file read access
    [popper/pop_config.c, CAN-2005-1151]
  * Backported upstream patch to fix unauthorised file write access
    [popper/popauth.c, CAN-2005-1151]
  * Applied upstream patch to ensure that no group- or world-readable
    files are created [popper/popauth.c, CAN-2005-1152]


stable/main/binary-alpha/qpopper-drac_4.0.4-2.woody.5_alpha.deb
stable/main/binary-alpha/qpopper_4.0.4-2.woody.5_alpha.deb
qpopper (4.0.4-2.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix unauthorised file read access
    [popper/pop_config.c, CAN-2005-1151]
  * Backported upstream patch to fix unauthorised file write access
    [popper/popauth.c, CAN-2005-1151]
  * Applied upstream patch to ensure that no group- or world-readable
    files are created [popper/popauth.c, CAN-2005-1152]


stable/main/source/qpopper_4.0.4-2.woody.5.diff.gz
stable/main/binary-i386/qpopper_4.0.4-2.woody.5_i386.deb
stable/main/binary-i386/qpopper-drac_4.0.4-2.woody.5_i386.deb
stable/main/source/qpopper_4.0.4-2.woody.5.dsc
qpopper (4.0.4-2.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix unauthorised file read access
    [popper/pop_config.c, CAN-2005-1151]
  * Backported upstream patch to fix unauthorised file write access
    [popper/popauth.c, CAN-2005-1151]
  * Applied upstream patch to ensure that no group- or world-readable
    files are created [popper/popauth.c, CAN-2005-1152]


stable/main/binary-sparc/prozilla_1.3.6-3woody2_sparc.deb
prozilla (1:1.3.6-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix format string vulnerability
    [src/curses.c. src/interface.h, CAN-2005-0523]


stable/main/binary-s390/prozilla_1.3.6-3woody2_s390.deb
prozilla (1:1.3.6-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix format string vulnerability
    [src/curses.c. src/interface.h, CAN-2005-0523]


stable/main/binary-powerpc/prozilla_1.3.6-3woody2_powerpc.deb
prozilla (1:1.3.6-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix format string vulnerability
    [src/curses.c. src/interface.h, CAN-2005-0523]


stable/main/binary-mips/prozilla_1.3.6-3woody2_mips.deb
prozilla (1:1.3.6-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix format string vulnerability
    [src/curses.c. src/interface.h, CAN-2005-0523]


stable/main/binary-m68k/prozilla_1.3.6-3woody2_m68k.deb
prozilla (1:1.3.6-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix format string vulnerability
    [src/curses.c. src/interface.h, CAN-2005-0523]


stable/main/binary-ia64/prozilla_1.3.6-3woody2_ia64.deb
prozilla (1:1.3.6-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix format string vulnerability
    [src/curses.c. src/interface.h, CAN-2005-0523]


stable/main/binary-i386/prozilla_1.3.6-3woody2_i386.deb
prozilla (1:1.3.6-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix format string vulnerability
    [src/curses.c. src/interface.h, CAN-2005-0523]


stable/main/binary-hppa/prozilla_1.3.6-3woody2_hppa.deb
prozilla (1:1.3.6-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix format string vulnerability
    [src/curses.c. src/interface.h, CAN-2005-0523]


stable/main/binary-arm/prozilla_1.3.6-3woody2_arm.deb
prozilla (1:1.3.6-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix format string vulnerability
    [src/curses.c. src/interface.h, CAN-2005-0523]


stable/main/binary-alpha/prozilla_1.3.6-3woody2_alpha.deb
prozilla (1:1.3.6-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix format string vulnerability
    [src/curses.c. src/interface.h, CAN-2005-0523]


stable/main/binary-mipsel/prozilla_1.3.6-3woody2_mipsel.deb
stable/main/source/prozilla_1.3.6-3woody2.diff.gz
stable/main/source/prozilla_1.3.6-3woody2.dsc
prozilla (1:1.3.6-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix format string vulnerability
    [src/curses.c. src/interface.h, CAN-2005-0523]


stable/main/binary-sparc/ppxp-x11_0.2001080415-6woody2_sparc.deb
stable/main/binary-sparc/ppxp_0.2001080415-6woody2_sparc.deb
stable/main/binary-sparc/ppxp-dev_0.2001080415-6woody2_sparc.deb
stable/main/binary-sparc/ppxp-tcltk_0.2001080415-6woody2_sparc.deb
ppxp (0.2001080415-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed chown() call which is superflous after dropping privileges
    [src/console.c, CAN-2005-0392]


stable/main/binary-s390/ppxp-x11_0.2001080415-6woody2_s390.deb
stable/main/binary-s390/ppxp_0.2001080415-6woody2_s390.deb
stable/main/binary-s390/ppxp-dev_0.2001080415-6woody2_s390.deb
stable/main/binary-s390/ppxp-tcltk_0.2001080415-6woody2_s390.deb
ppxp (0.2001080415-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed chown() call which is superflous after dropping privileges
    [src/console.c, CAN-2005-0392]


stable/main/binary-powerpc/ppxp-dev_0.2001080415-6woody2_powerpc.deb
stable/main/binary-powerpc/ppxp-x11_0.2001080415-6woody2_powerpc.deb
stable/main/binary-powerpc/ppxp-tcltk_0.2001080415-6woody2_powerpc.deb
stable/main/binary-powerpc/ppxp_0.2001080415-6woody2_powerpc.deb
ppxp (0.2001080415-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed chown() call which is superflous after dropping privileges
    [src/console.c, CAN-2005-0392]


stable/main/binary-mipsel/ppxp-x11_0.2001080415-6woody2_mipsel.deb
stable/main/binary-mipsel/ppxp-tcltk_0.2001080415-6woody2_mipsel.deb
stable/main/binary-mipsel/ppxp_0.2001080415-6woody2_mipsel.deb
stable/main/binary-mipsel/ppxp-dev_0.2001080415-6woody2_mipsel.deb
ppxp (0.2001080415-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed chown() call which is superflous after dropping privileges
    [src/console.c, CAN-2005-0392]


stable/main/binary-mips/ppxp-tcltk_0.2001080415-6woody2_mips.deb
stable/main/binary-mips/ppxp-dev_0.2001080415-6woody2_mips.deb
stable/main/binary-mips/ppxp-x11_0.2001080415-6woody2_mips.deb
stable/main/binary-mips/ppxp_0.2001080415-6woody2_mips.deb
ppxp (0.2001080415-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed chown() call which is superflous after dropping privileges
    [src/console.c, CAN-2005-0392]


stable/main/binary-m68k/ppxp-dev_0.2001080415-6woody2_m68k.deb
stable/main/binary-m68k/ppxp-tcltk_0.2001080415-6woody2_m68k.deb
stable/main/binary-m68k/ppxp_0.2001080415-6woody2_m68k.deb
stable/main/binary-m68k/ppxp-x11_0.2001080415-6woody2_m68k.deb
ppxp (0.2001080415-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed chown() call which is superflous after dropping privileges
    [src/console.c, CAN-2005-0392]


stable/main/binary-ia64/ppxp-x11_0.2001080415-6woody2_ia64.deb
stable/main/binary-ia64/ppxp-dev_0.2001080415-6woody2_ia64.deb
stable/main/binary-ia64/ppxp_0.2001080415-6woody2_ia64.deb
stable/main/binary-ia64/ppxp-tcltk_0.2001080415-6woody2_ia64.deb
ppxp (0.2001080415-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed chown() call which is superflous after dropping privileges
    [src/console.c, CAN-2005-0392]


stable/main/binary-hppa/ppxp-x11_0.2001080415-6woody2_hppa.deb
stable/main/binary-hppa/ppxp_0.2001080415-6woody2_hppa.deb
stable/main/binary-hppa/ppxp-tcltk_0.2001080415-6woody2_hppa.deb
stable/main/binary-hppa/ppxp-dev_0.2001080415-6woody2_hppa.deb
ppxp (0.2001080415-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed chown() call which is superflous after dropping privileges
    [src/console.c, CAN-2005-0392]


stable/main/binary-arm/ppxp-tcltk_0.2001080415-6woody2_arm.deb
stable/main/binary-arm/ppxp_0.2001080415-6woody2_arm.deb
stable/main/binary-arm/ppxp-x11_0.2001080415-6woody2_arm.deb
stable/main/binary-arm/ppxp-dev_0.2001080415-6woody2_arm.deb
ppxp (0.2001080415-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed chown() call which is superflous after dropping privileges
    [src/console.c, CAN-2005-0392]


stable/main/binary-alpha/ppxp-x11_0.2001080415-6woody2_alpha.deb
stable/main/binary-alpha/ppxp-dev_0.2001080415-6woody2_alpha.deb
stable/main/binary-alpha/ppxp-tcltk_0.2001080415-6woody2_alpha.deb
stable/main/binary-alpha/ppxp_0.2001080415-6woody2_alpha.deb
ppxp (0.2001080415-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed chown() call which is superflous after dropping privileges
    [src/console.c, CAN-2005-0392]


stable/main/binary-i386/ppxp_0.2001080415-6woody2_i386.deb
stable/main/binary-i386/ppxp-x11_0.2001080415-6woody2_i386.deb
stable/main/binary-i386/ppxp-dev_0.2001080415-6woody2_i386.deb
stable/main/binary-i386/ppxp-tcltk_0.2001080415-6woody2_i386.deb
stable/main/source/ppxp_0.2001080415-6woody2.diff.gz
stable/main/source/ppxp_0.2001080415-6woody2.dsc
ppxp (0.2001080415-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed chown() call which is superflous after dropping privileges
    [src/console.c, CAN-2005-0392]


stable/main/binary-all/phpsysinfo_2.0-3woody2_all.deb
stable/main/source/phpsysinfo_2.0-3woody2.dsc
stable/main/source/phpsysinfo_2.0-3woody2.diff.gz
phpsysinfo (2.0-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added precaution to prevent include files to be executed on their own
    [includes/system_footer.php, includes/system_header.php,
    CAN-2005-0870]


stable/main/binary-sparc/php4-imap_4.1.2-7.woody4_sparc.deb
stable/main/binary-sparc/php4-xslt_4.1.2-7.woody4_sparc.deb
stable/main/binary-sparc/php4-odbc_4.1.2-7.woody4_sparc.deb
stable/main/binary-sparc/php4-recode_4.1.2-7.woody4_sparc.deb
stable/main/binary-sparc/php4-domxml_4.1.2-7.woody4_sparc.deb
stable/main/binary-sparc/php4-curl_4.1.2-7.woody4_sparc.deb
stable/main/binary-sparc/caudium-php4_4.1.2-7.woody4_sparc.deb
stable/main/binary-sparc/php4-sybase_4.1.2-7.woody4_sparc.deb
stable/main/binary-sparc/php4-mysql_4.1.2-7.woody4_sparc.deb
stable/main/binary-sparc/php4-snmp_4.1.2-7.woody4_sparc.deb
stable/main/binary-sparc/php4-gd_4.1.2-7.woody4_sparc.deb
stable/main/binary-sparc/php4-mhash_4.1.2-7.woody4_sparc.deb
stable/main/binary-sparc/php4-ldap_4.1.2-7.woody4_sparc.deb
stable/main/binary-sparc/php4-cgi_4.1.2-7.woody4_sparc.deb
stable/main/binary-sparc/php4-mcal_4.1.2-7.woody4_sparc.deb
stable/main/binary-sparc/php4_4.1.2-7.woody4_sparc.deb
php4 (4:4.1.2-7.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload to get the architectures in sync (i386 buildd didn't
    upload properly)


stable/main/binary-s390/php4-mhash_4.1.2-7.woody4_s390.deb
stable/main/binary-s390/php4-gd_4.1.2-7.woody4_s390.deb
stable/main/binary-s390/php4-cgi_4.1.2-7.woody4_s390.deb
stable/main/binary-s390/php4-domxml_4.1.2-7.woody4_s390.deb
stable/main/binary-s390/php4-mcal_4.1.2-7.woody4_s390.deb
stable/main/binary-s390/php4-imap_4.1.2-7.woody4_s390.deb
stable/main/binary-s390/php4-ldap_4.1.2-7.woody4_s390.deb
stable/main/binary-s390/php4-snmp_4.1.2-7.woody4_s390.deb
stable/main/binary-s390/php4-xslt_4.1.2-7.woody4_s390.deb
stable/main/binary-s390/php4_4.1.2-7.woody4_s390.deb
stable/main/binary-s390/php4-curl_4.1.2-7.woody4_s390.deb
stable/main/binary-s390/caudium-php4_4.1.2-7.woody4_s390.deb
stable/main/binary-s390/php4-recode_4.1.2-7.woody4_s390.deb
stable/main/binary-s390/php4-odbc_4.1.2-7.woody4_s390.deb
stable/main/binary-s390/php4-sybase_4.1.2-7.woody4_s390.deb
stable/main/binary-s390/php4-mysql_4.1.2-7.woody4_s390.deb
php4 (4:4.1.2-7.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload to get the architectures in sync (i386 buildd didn't
    upload properly)


stable/main/binary-powerpc/php4-ldap_4.1.2-7.woody4_powerpc.deb
stable/main/binary-powerpc/php4-mcal_4.1.2-7.woody4_powerpc.deb
stable/main/binary-powerpc/php4-domxml_4.1.2-7.woody4_powerpc.deb
stable/main/binary-powerpc/php4-gd_4.1.2-7.woody4_powerpc.deb
stable/main/binary-powerpc/php4-mhash_4.1.2-7.woody4_powerpc.deb
stable/main/binary-powerpc/php4_4.1.2-7.woody4_powerpc.deb
stable/main/binary-powerpc/php4-snmp_4.1.2-7.woody4_powerpc.deb
stable/main/binary-powerpc/php4-curl_4.1.2-7.woody4_powerpc.deb
stable/main/binary-powerpc/php4-sybase_4.1.2-7.woody4_powerpc.deb
stable/main/binary-powerpc/php4-cgi_4.1.2-7.woody4_powerpc.deb
stable/main/binary-powerpc/caudium-php4_4.1.2-7.woody4_powerpc.deb
stable/main/binary-powerpc/php4-mysql_4.1.2-7.woody4_powerpc.deb
stable/main/binary-powerpc/php4-recode_4.1.2-7.woody4_powerpc.deb
stable/main/binary-powerpc/php4-imap_4.1.2-7.woody4_powerpc.deb
stable/main/binary-powerpc/php4-odbc_4.1.2-7.woody4_powerpc.deb
stable/main/binary-powerpc/php4-xslt_4.1.2-7.woody4_powerpc.deb
php4 (4:4.1.2-7.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload to get the architectures in sync (i386 buildd didn't
    upload properly)


stable/main/binary-mipsel/php4-gd_4.1.2-7.woody4_mipsel.deb
stable/main/binary-mipsel/php4-domxml_4.1.2-7.woody4_mipsel.deb
stable/main/binary-mipsel/php4-ldap_4.1.2-7.woody4_mipsel.deb
stable/main/binary-mipsel/php4-sybase_4.1.2-7.woody4_mipsel.deb
stable/main/binary-mipsel/php4-snmp_4.1.2-7.woody4_mipsel.deb
stable/main/binary-mipsel/php4-xslt_4.1.2-7.woody4_mipsel.deb
stable/main/binary-mipsel/php4-curl_4.1.2-7.woody4_mipsel.deb
stable/main/binary-mipsel/php4-cgi_4.1.2-7.woody4_mipsel.deb
stable/main/binary-mipsel/php4-mysql_4.1.2-7.woody4_mipsel.deb
stable/main/binary-mipsel/php4-mhash_4.1.2-7.woody4_mipsel.deb
stable/main/binary-mipsel/caudium-php4_4.1.2-7.woody4_mipsel.deb
stable/main/binary-mipsel/php4-imap_4.1.2-7.woody4_mipsel.deb
stable/main/binary-mipsel/php4-odbc_4.1.2-7.woody4_mipsel.deb
stable/main/binary-mipsel/php4-mcal_4.1.2-7.woody4_mipsel.deb
stable/main/binary-mipsel/php4-recode_4.1.2-7.woody4_mipsel.deb
stable/main/binary-mipsel/php4_4.1.2-7.woody4_mipsel.deb
php4 (4:4.1.2-7.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload to get the architectures in sync (i386 buildd didn't
    upload properly)


stable/main/binary-mips/php4-sybase_4.1.2-7.woody4_mips.deb
stable/main/binary-mips/caudium-php4_4.1.2-7.woody4_mips.deb
stable/main/binary-mips/php4-imap_4.1.2-7.woody4_mips.deb
stable/main/binary-mips/php4-gd_4.1.2-7.woody4_mips.deb
stable/main/binary-mips/php4-cgi_4.1.2-7.woody4_mips.deb
stable/main/binary-mips/php4-snmp_4.1.2-7.woody4_mips.deb
stable/main/binary-mips/php4-ldap_4.1.2-7.woody4_mips.deb
stable/main/binary-mips/php4_4.1.2-7.woody4_mips.deb
stable/main/binary-mips/php4-mcal_4.1.2-7.woody4_mips.deb
stable/main/binary-mips/php4-curl_4.1.2-7.woody4_mips.deb
stable/main/binary-mips/php4-domxml_4.1.2-7.woody4_mips.deb
stable/main/binary-mips/php4-mysql_4.1.2-7.woody4_mips.deb
stable/main/binary-mips/php4-mhash_4.1.2-7.woody4_mips.deb
stable/main/binary-mips/php4-recode_4.1.2-7.woody4_mips.deb
stable/main/binary-mips/php4-xslt_4.1.2-7.woody4_mips.deb
stable/main/binary-mips/php4-odbc_4.1.2-7.woody4_mips.deb
php4 (4:4.1.2-7.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload to get the architectures in sync (i386 buildd didn't
    upload properly)


stable/main/binary-m68k/php4-sybase_4.1.2-7.woody4_m68k.deb
stable/main/binary-m68k/php4-cgi_4.1.2-7.woody4_m68k.deb
stable/main/binary-m68k/php4-imap_4.1.2-7.woody4_m68k.deb
stable/main/binary-m68k/php4-mhash_4.1.2-7.woody4_m68k.deb
stable/main/binary-m68k/php4-gd_4.1.2-7.woody4_m68k.deb
stable/main/binary-m68k/php4-snmp_4.1.2-7.woody4_m68k.deb
stable/main/binary-m68k/php4-domxml_4.1.2-7.woody4_m68k.deb
stable/main/binary-m68k/caudium-php4_4.1.2-7.woody4_m68k.deb
stable/main/binary-m68k/php4-mysql_4.1.2-7.woody4_m68k.deb
stable/main/binary-m68k/php4-mcal_4.1.2-7.woody4_m68k.deb
stable/main/binary-m68k/php4-odbc_4.1.2-7.woody4_m68k.deb
stable/main/binary-m68k/php4_4.1.2-7.woody4_m68k.deb
stable/main/binary-m68k/php4-ldap_4.1.2-7.woody4_m68k.deb
stable/main/binary-m68k/php4-recode_4.1.2-7.woody4_m68k.deb
stable/main/binary-m68k/php4-xslt_4.1.2-7.woody4_m68k.deb
stable/main/binary-m68k/php4-curl_4.1.2-7.woody4_m68k.deb
php4 (4:4.1.2-7.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload to get the architectures in sync (i386 buildd didn't
    upload properly)


stable/main/binary-ia64/php4-gd_4.1.2-7.woody4_ia64.deb
stable/main/binary-ia64/php4-sybase_4.1.2-7.woody4_ia64.deb
stable/main/binary-ia64/php4-cgi_4.1.2-7.woody4_ia64.deb
stable/main/binary-ia64/caudium-php4_4.1.2-7.woody4_ia64.deb
stable/main/binary-ia64/php4-imap_4.1.2-7.woody4_ia64.deb
stable/main/binary-ia64/php4-ldap_4.1.2-7.woody4_ia64.deb
stable/main/binary-ia64/php4-mhash_4.1.2-7.woody4_ia64.deb
stable/main/binary-ia64/php4-snmp_4.1.2-7.woody4_ia64.deb
stable/main/binary-ia64/php4-domxml_4.1.2-7.woody4_ia64.deb
stable/main/binary-ia64/php4_4.1.2-7.woody4_ia64.deb
stable/main/binary-ia64/php4-mcal_4.1.2-7.woody4_ia64.deb
stable/main/binary-ia64/php4-recode_4.1.2-7.woody4_ia64.deb
stable/main/binary-ia64/php4-odbc_4.1.2-7.woody4_ia64.deb
stable/main/binary-ia64/php4-mysql_4.1.2-7.woody4_ia64.deb
stable/main/binary-ia64/php4-curl_4.1.2-7.woody4_ia64.deb
stable/main/binary-ia64/php4-xslt_4.1.2-7.woody4_ia64.deb
php4 (4:4.1.2-7.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload to get the architectures in sync (i386 buildd didn't
    upload properly)


stable/main/binary-i386/php4-mysql_4.1.2-7.woody4_i386.deb
stable/main/binary-i386/php4-xslt_4.1.2-7.woody4_i386.deb
stable/main/binary-i386/php4_4.1.2-7.woody4_i386.deb
stable/main/binary-i386/php4-ldap_4.1.2-7.woody4_i386.deb
stable/main/binary-i386/php4-curl_4.1.2-7.woody4_i386.deb
stable/main/binary-i386/caudium-php4_4.1.2-7.woody4_i386.deb
stable/main/binary-i386/php4-mcal_4.1.2-7.woody4_i386.deb
stable/main/binary-i386/php4-domxml_4.1.2-7.woody4_i386.deb
stable/main/binary-i386/php4-mhash_4.1.2-7.woody4_i386.deb
stable/main/binary-i386/php4-gd_4.1.2-7.woody4_i386.deb
stable/main/binary-i386/php4-imap_4.1.2-7.woody4_i386.deb
stable/main/binary-i386/php4-odbc_4.1.2-7.woody4_i386.deb
stable/main/binary-i386/php4-snmp_4.1.2-7.woody4_i386.deb
stable/main/binary-i386/php4-recode_4.1.2-7.woody4_i386.deb
stable/main/binary-i386/php4-sybase_4.1.2-7.woody4_i386.deb
stable/main/binary-i386/php4-cgi_4.1.2-7.woody4_i386.deb
php4 (4:4.1.2-7.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload to get the architectures in sync (i386 buildd didn't
    upload properly)


stable/main/binary-arm/php4-odbc_4.1.2-7.woody4_arm.deb
stable/main/binary-arm/php4-recode_4.1.2-7.woody4_arm.deb
stable/main/binary-arm/php4-sybase_4.1.2-7.woody4_arm.deb
stable/main/binary-arm/php4-ldap_4.1.2-7.woody4_arm.deb
stable/main/binary-arm/php4-mysql_4.1.2-7.woody4_arm.deb
stable/main/binary-arm/php4-xslt_4.1.2-7.woody4_arm.deb
stable/main/binary-arm/php4-gd_4.1.2-7.woody4_arm.deb
stable/main/binary-arm/php4-domxml_4.1.2-7.woody4_arm.deb
stable/main/binary-arm/php4-cgi_4.1.2-7.woody4_arm.deb
stable/main/binary-arm/php4-mcal_4.1.2-7.woody4_arm.deb
stable/main/binary-arm/php4-curl_4.1.2-7.woody4_arm.deb
stable/main/binary-arm/php4-snmp_4.1.2-7.woody4_arm.deb
stable/main/binary-arm/caudium-php4_4.1.2-7.woody4_arm.deb
stable/main/binary-arm/php4-imap_4.1.2-7.woody4_arm.deb
stable/main/binary-arm/php4-mhash_4.1.2-7.woody4_arm.deb
stable/main/binary-arm/php4_4.1.2-7.woody4_arm.deb
php4 (4:4.1.2-7.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload to get the architectures in sync (i386 buildd didn't
    upload properly)


stable/main/binary-alpha/php4-mhash_4.1.2-7.woody4_alpha.deb
stable/main/binary-alpha/php4-mysql_4.1.2-7.woody4_alpha.deb
stable/main/binary-alpha/php4-domxml_4.1.2-7.woody4_alpha.deb
stable/main/binary-alpha/php4-imap_4.1.2-7.woody4_alpha.deb
stable/main/binary-alpha/php4_4.1.2-7.woody4_alpha.deb
stable/main/binary-alpha/php4-mcal_4.1.2-7.woody4_alpha.deb
stable/main/binary-alpha/php4-snmp_4.1.2-7.woody4_alpha.deb
stable/main/binary-alpha/php4-cgi_4.1.2-7.woody4_alpha.deb
stable/main/binary-alpha/php4-ldap_4.1.2-7.woody4_alpha.deb
stable/main/binary-alpha/php4-xslt_4.1.2-7.woody4_alpha.deb
stable/main/binary-alpha/php4-gd_4.1.2-7.woody4_alpha.deb
stable/main/binary-alpha/caudium-php4_4.1.2-7.woody4_alpha.deb
stable/main/binary-alpha/php4-curl_4.1.2-7.woody4_alpha.deb
stable/main/binary-alpha/php4-recode_4.1.2-7.woody4_alpha.deb
stable/main/binary-alpha/php4-odbc_4.1.2-7.woody4_alpha.deb
stable/main/binary-alpha/php4-sybase_4.1.2-7.woody4_alpha.deb
php4 (4:4.1.2-7.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload to get the architectures in sync (i386 buildd didn't
    upload properly)


stable/main/binary-hppa/php4-mysql_4.1.2-7.woody4_hppa.deb
stable/main/source/php4_4.1.2-7.woody4.dsc
stable/main/binary-hppa/php4-sybase_4.1.2-7.woody4_hppa.deb
stable/main/source/php4_4.1.2-7.woody4.diff.gz
stable/main/binary-hppa/php4-cgi_4.1.2-7.woody4_hppa.deb
stable/main/binary-hppa/php4-snmp_4.1.2-7.woody4_hppa.deb
stable/main/binary-hppa/php4-mhash_4.1.2-7.woody4_hppa.deb
stable/main/binary-hppa/php4-curl_4.1.2-7.woody4_hppa.deb
stable/main/binary-hppa/php4-domxml_4.1.2-7.woody4_hppa.deb
stable/main/binary-hppa/php4-mcal_4.1.2-7.woody4_hppa.deb
stable/main/binary-hppa/php4_4.1.2-7.woody4_hppa.deb
stable/main/binary-all/php4-pear_4.1.2-7.woody4_all.deb
stable/main/binary-hppa/php4-gd_4.1.2-7.woody4_hppa.deb
stable/main/binary-hppa/caudium-php4_4.1.2-7.woody4_hppa.deb
stable/main/binary-hppa/php4-ldap_4.1.2-7.woody4_hppa.deb
stable/main/binary-hppa/php4-xslt_4.1.2-7.woody4_hppa.deb
stable/main/binary-hppa/php4-imap_4.1.2-7.woody4_hppa.deb
stable/main/binary-all/php4-dev_4.1.2-7.woody4_all.deb
stable/main/binary-hppa/php4-odbc_4.1.2-7.woody4_hppa.deb
stable/main/binary-hppa/php4-recode_4.1.2-7.woody4_hppa.deb
php4 (4:4.1.2-7.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload to get the architectures in sync (i386 buildd didn't
    upload properly)


stable/main/binary-arm/telnetd_0.17-18woody3_arm.deb
stable/main/binary-arm/telnet_0.17-18woody3_arm.deb
netkit-telnet (0.17-18woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-sparc/mysql-client_3.23.49-8.13_sparc.deb
stable/main/binary-sparc/mysql-server_3.23.49-8.13_sparc.deb
stable/main/binary-sparc/libmysqlclient10-dev_3.23.49-8.13_sparc.deb
stable/main/binary-sparc/libmysqlclient10_3.23.49-8.13_sparc.deb
mysql (3.23.49-8.13) stable; urgency=high
  * In the corner case that someone upgrades from woody's version of
    mysql-server to mysql-server-4.1, and they have the mysql datadir
    or mysql logdir symlinked to somewhere else, the symlink would be
    lost.  this no longer happens, by having copies of the symlinks
    being stored (in non-purge removals) in a directory where 4.1
    will look for them.
  * 8.12 was never uploaded, so this version will also address the
    breakage by the previous security update.


stable/main/binary-s390/mysql-server_3.23.49-8.13_s390.deb
stable/main/binary-s390/libmysqlclient10-dev_3.23.49-8.13_s390.deb
stable/main/binary-s390/libmysqlclient10_3.23.49-8.13_s390.deb
stable/main/binary-s390/mysql-client_3.23.49-8.13_s390.deb
mysql (3.23.49-8.13) stable; urgency=high
  * In the corner case that someone upgrades from woody's version of
    mysql-server to mysql-server-4.1, and they have the mysql datadir
    or mysql logdir symlinked to somewhere else, the symlink would be
    lost.  this no longer happens, by having copies of the symlinks
    being stored (in non-purge removals) in a directory where 4.1
    will look for them.
  * 8.12 was never uploaded, so this version will also address the
    breakage by the previous security update.


stable/main/binary-powerpc/libmysqlclient10-dev_3.23.49-8.13_powerpc.deb
stable/main/binary-powerpc/mysql-server_3.23.49-8.13_powerpc.deb
stable/main/binary-powerpc/libmysqlclient10_3.23.49-8.13_powerpc.deb
stable/main/binary-powerpc/mysql-client_3.23.49-8.13_powerpc.deb
mysql (3.23.49-8.13) stable; urgency=high
  * In the corner case that someone upgrades from woody's version of
    mysql-server to mysql-server-4.1, and they have the mysql datadir
    or mysql logdir symlinked to somewhere else, the symlink would be
    lost.  this no longer happens, by having copies of the symlinks
    being stored (in non-purge removals) in a directory where 4.1
    will look for them.
  * 8.12 was never uploaded, so this version will also address the
    breakage by the previous security update.


stable/main/binary-mipsel/mysql-client_3.23.49-8.13_mipsel.deb
stable/main/binary-mipsel/libmysqlclient10-dev_3.23.49-8.13_mipsel.deb
stable/main/binary-mipsel/mysql-server_3.23.49-8.13_mipsel.deb
stable/main/binary-mipsel/libmysqlclient10_3.23.49-8.13_mipsel.deb
mysql (3.23.49-8.13) stable; urgency=high
  * In the corner case that someone upgrades from woody's version of
    mysql-server to mysql-server-4.1, and they have the mysql datadir
    or mysql logdir symlinked to somewhere else, the symlink would be
    lost.  this no longer happens, by having copies of the symlinks
    being stored (in non-purge removals) in a directory where 4.1
    will look for them.
  * 8.12 was never uploaded, so this version will also address the
    breakage by the previous security update.


stable/main/binary-mips/libmysqlclient10-dev_3.23.49-8.13_mips.deb
stable/main/binary-mips/mysql-server_3.23.49-8.13_mips.deb
stable/main/binary-mips/libmysqlclient10_3.23.49-8.13_mips.deb
stable/main/binary-mips/mysql-client_3.23.49-8.13_mips.deb
mysql (3.23.49-8.13) stable; urgency=high
  * In the corner case that someone upgrades from woody's version of
    mysql-server to mysql-server-4.1, and they have the mysql datadir
    or mysql logdir symlinked to somewhere else, the symlink would be
    lost.  this no longer happens, by having copies of the symlinks
    being stored (in non-purge removals) in a directory where 4.1
    will look for them.
  * 8.12 was never uploaded, so this version will also address the
    breakage by the previous security update.


stable/main/binary-m68k/mysql-server_3.23.49-8.13_m68k.deb
stable/main/binary-m68k/libmysqlclient10-dev_3.23.49-8.13_m68k.deb
stable/main/binary-m68k/mysql-client_3.23.49-8.13_m68k.deb
stable/main/binary-m68k/libmysqlclient10_3.23.49-8.13_m68k.deb
mysql (3.23.49-8.13) stable; urgency=high
  * In the corner case that someone upgrades from woody's version of
    mysql-server to mysql-server-4.1, and they have the mysql datadir
    or mysql logdir symlinked to somewhere else, the symlink would be
    lost.  this no longer happens, by having copies of the symlinks
    being stored (in non-purge removals) in a directory where 4.1
    will look for them.
  * 8.12 was never uploaded, so this version will also address the
    breakage by the previous security update.


stable/main/binary-ia64/mysql-server_3.23.49-8.13_ia64.deb
stable/main/binary-ia64/libmysqlclient10_3.23.49-8.13_ia64.deb
stable/main/binary-ia64/libmysqlclient10-dev_3.23.49-8.13_ia64.deb
stable/main/binary-ia64/mysql-client_3.23.49-8.13_ia64.deb
mysql (3.23.49-8.13) stable; urgency=high
  * In the corner case that someone upgrades from woody's version of
    mysql-server to mysql-server-4.1, and they have the mysql datadir
    or mysql logdir symlinked to somewhere else, the symlink would be
    lost.  this no longer happens, by having copies of the symlinks
    being stored (in non-purge removals) in a directory where 4.1
    will look for them.
  * 8.12 was never uploaded, so this version will also address the
    breakage by the previous security update.


stable/main/binary-hppa/mysql-client_3.23.49-8.13_hppa.deb
stable/main/binary-hppa/libmysqlclient10-dev_3.23.49-8.13_hppa.deb
stable/main/binary-hppa/libmysqlclient10_3.23.49-8.13_hppa.deb
stable/main/binary-hppa/mysql-server_3.23.49-8.13_hppa.deb
mysql (3.23.49-8.13) stable; urgency=high
  * In the corner case that someone upgrades from woody's version of
    mysql-server to mysql-server-4.1, and they have the mysql datadir
    or mysql logdir symlinked to somewhere else, the symlink would be
    lost.  this no longer happens, by having copies of the symlinks
    being stored (in non-purge removals) in a directory where 4.1
    will look for them.
  * 8.12 was never uploaded, so this version will also address the
    breakage by the previous security update.


stable/main/binary-arm/mysql-client_3.23.49-8.13_arm.deb
stable/main/binary-arm/libmysqlclient10_3.23.49-8.13_arm.deb
stable/main/binary-arm/libmysqlclient10-dev_3.23.49-8.13_arm.deb
stable/main/binary-arm/mysql-server_3.23.49-8.13_arm.deb
mysql (3.23.49-8.13) stable; urgency=high
  * In the corner case that someone upgrades from woody's version of
    mysql-server to mysql-server-4.1, and they have the mysql datadir
    or mysql logdir symlinked to somewhere else, the symlink would be
    lost.  this no longer happens, by having copies of the symlinks
    being stored (in non-purge removals) in a directory where 4.1
    will look for them.
  * 8.12 was never uploaded, so this version will also address the
    breakage by the previous security update.


stable/main/binary-alpha/mysql-server_3.23.49-8.13_alpha.deb
stable/main/binary-alpha/libmysqlclient10_3.23.49-8.13_alpha.deb
stable/main/binary-alpha/libmysqlclient10-dev_3.23.49-8.13_alpha.deb
stable/main/binary-alpha/mysql-client_3.23.49-8.13_alpha.deb
mysql (3.23.49-8.13) stable; urgency=high
  * In the corner case that someone upgrades from woody's version of
    mysql-server to mysql-server-4.1, and they have the mysql datadir
    or mysql logdir symlinked to somewhere else, the symlink would be
    lost.  this no longer happens, by having copies of the symlinks
    being stored (in non-purge removals) in a directory where 4.1
    will look for them.
  * 8.12 was never uploaded, so this version will also address the
    breakage by the previous security update.


stable/main/binary-i386/mysql-client_3.23.49-8.13_i386.deb
stable/main/binary-i386/libmysqlclient10_3.23.49-8.13_i386.deb
stable/main/source/mysql_3.23.49-8.13.diff.gz
stable/main/source/mysql_3.23.49-8.13.dsc
stable/main/binary-all/mysql-common_3.23.49-8.13_all.deb
stable/main/binary-i386/mysql-server_3.23.49-8.13_i386.deb
stable/main/binary-i386/libmysqlclient10-dev_3.23.49-8.13_i386.deb
mysql (3.23.49-8.13) stable; urgency=high
  * In the corner case that someone upgrades from woody's version of
    mysql-server to mysql-server-4.1, and they have the mysql datadir
    or mysql logdir symlinked to somewhere else, the symlink would be
    lost.  this no longer happens, by having copies of the symlinks
    being stored (in non-purge removals) in a directory where 4.1
    will look for them.
  * 8.12 was never uploaded, so this version will also address the
    breakage by the previous security update.


stable/main/binary-sparc/lsh-server_1.2.5-2woody3_sparc.deb
stable/main/binary-sparc/lsh-client_1.2.5-2woody3_sparc.deb
stable/main/binary-sparc/lsh-utils_1.2.5-2woody3_sparc.deb
lsh-utils (1.2.5-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * The previous upload had the incorrect CVE ID, the denial
    of service attack is correctly referred to as [CAN-2005-0814]


stable/main/binary-s390/lsh-server_1.2.5-2woody3_s390.deb
stable/main/binary-s390/lsh-client_1.2.5-2woody3_s390.deb
stable/main/binary-s390/lsh-utils_1.2.5-2woody3_s390.deb
lsh-utils (1.2.5-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * The previous upload had the incorrect CVE ID, the denial
    of service attack is correctly referred to as [CAN-2005-0814]


stable/main/binary-powerpc/lsh-client_1.2.5-2woody3_powerpc.deb
stable/main/binary-powerpc/lsh-utils_1.2.5-2woody3_powerpc.deb
stable/main/binary-powerpc/lsh-server_1.2.5-2woody3_powerpc.deb
lsh-utils (1.2.5-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * The previous upload had the incorrect CVE ID, the denial
    of service attack is correctly referred to as [CAN-2005-0814]


stable/main/binary-mipsel/lsh-client_1.2.5-2woody3_mipsel.deb
stable/main/binary-mipsel/lsh-utils_1.2.5-2woody3_mipsel.deb
stable/main/binary-mipsel/lsh-server_1.2.5-2woody3_mipsel.deb
lsh-utils (1.2.5-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * The previous upload had the incorrect CVE ID, the denial
    of service attack is correctly referred to as [CAN-2005-0814]


stable/main/binary-mips/lsh-server_1.2.5-2woody3_mips.deb
stable/main/binary-mips/lsh-utils_1.2.5-2woody3_mips.deb
stable/main/binary-mips/lsh-client_1.2.5-2woody3_mips.deb
lsh-utils (1.2.5-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * The previous upload had the incorrect CVE ID, the denial
    of service attack is correctly referred to as [CAN-2005-0814]


stable/main/binary-m68k/lsh-utils_1.2.5-2woody3_m68k.deb
stable/main/binary-m68k/lsh-server_1.2.5-2woody3_m68k.deb
stable/main/binary-m68k/lsh-client_1.2.5-2woody3_m68k.deb
lsh-utils (1.2.5-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * The previous upload had the incorrect CVE ID, the denial
    of service attack is correctly referred to as [CAN-2005-0814]


stable/main/binary-hppa/lsh-server_1.2.5-2woody3_hppa.deb
stable/main/binary-hppa/lsh-client_1.2.5-2woody3_hppa.deb
stable/main/binary-hppa/lsh-utils_1.2.5-2woody3_hppa.deb
lsh-utils (1.2.5-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * The previous upload had the incorrect CVE ID, the denial
    of service attack is correctly referred to as [CAN-2005-0814]


stable/main/binary-arm/lsh-utils_1.2.5-2woody3_arm.deb
stable/main/binary-arm/lsh-server_1.2.5-2woody3_arm.deb
stable/main/binary-arm/lsh-client_1.2.5-2woody3_arm.deb
lsh-utils (1.2.5-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * The previous upload had the incorrect CVE ID, the denial
    of service attack is correctly referred to as [CAN-2005-0814]


stable/main/binary-alpha/lsh-server_1.2.5-2woody3_alpha.deb
stable/main/binary-alpha/lsh-utils_1.2.5-2woody3_alpha.deb
stable/main/binary-alpha/lsh-client_1.2.5-2woody3_alpha.deb
lsh-utils (1.2.5-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * The previous upload had the incorrect CVE ID, the denial
    of service attack is correctly referred to as [CAN-2005-0814]


stable/main/binary-i386/lsh-server_1.2.5-2woody3_i386.deb
stable/main/binary-i386/lsh-utils_1.2.5-2woody3_i386.deb
stable/main/source/lsh-utils_1.2.5-2woody3.dsc
stable/main/binary-i386/lsh-client_1.2.5-2woody3_i386.deb
stable/main/source/lsh-utils_1.2.5-2woody3.diff.gz
stable/main/binary-all/lsh-utils-doc_1.2.5-2woody3_all.deb
lsh-utils (1.2.5-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * The previous upload had the incorrect CVE ID, the denial
    of service attack is correctly referred to as [CAN-2005-0814]


stable/main/binary-sparc/libexif5_0.5.0-1woody1_sparc.deb
stable/main/binary-sparc/libexif-dev_0.5.0-1woody1_sparc.deb
libexif (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Sylvain Defresne, partially also present in
    upstream CVS [libexif/exif-data.c, CAN-2005-0664]


stable/main/binary-s390/libexif5_0.5.0-1woody1_s390.deb
stable/main/binary-s390/libexif-dev_0.5.0-1woody1_s390.deb
libexif (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Sylvain Defresne, partially also present in
    upstream CVS [libexif/exif-data.c, CAN-2005-0664]


stable/main/binary-powerpc/libexif5_0.5.0-1woody1_powerpc.deb
stable/main/binary-powerpc/libexif-dev_0.5.0-1woody1_powerpc.deb
libexif (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Sylvain Defresne, partially also present in
    upstream CVS [libexif/exif-data.c, CAN-2005-0664]


stable/main/binary-mipsel/libexif5_0.5.0-1woody1_mipsel.deb
stable/main/binary-mipsel/libexif-dev_0.5.0-1woody1_mipsel.deb
libexif (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Sylvain Defresne, partially also present in
    upstream CVS [libexif/exif-data.c, CAN-2005-0664]


stable/main/binary-mips/libexif5_0.5.0-1woody1_mips.deb
stable/main/binary-mips/libexif-dev_0.5.0-1woody1_mips.deb
libexif (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Sylvain Defresne, partially also present in
    upstream CVS [libexif/exif-data.c, CAN-2005-0664]


stable/main/binary-m68k/libexif-dev_0.5.0-1woody1_m68k.deb
stable/main/binary-m68k/libexif5_0.5.0-1woody1_m68k.deb
libexif (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Sylvain Defresne, partially also present in
    upstream CVS [libexif/exif-data.c, CAN-2005-0664]


stable/main/binary-ia64/libexif5_0.5.0-1woody1_ia64.deb
stable/main/binary-ia64/libexif-dev_0.5.0-1woody1_ia64.deb
libexif (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Sylvain Defresne, partially also present in
    upstream CVS [libexif/exif-data.c, CAN-2005-0664]


stable/main/binary-i386/libexif-dev_0.5.0-1woody1_i386.deb
stable/main/binary-i386/libexif5_0.5.0-1woody1_i386.deb
libexif (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Sylvain Defresne, partially also present in
    upstream CVS [libexif/exif-data.c, CAN-2005-0664]


stable/main/binary-hppa/libexif5_0.5.0-1woody1_hppa.deb
stable/main/binary-hppa/libexif-dev_0.5.0-1woody1_hppa.deb
libexif (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Sylvain Defresne, partially also present in
    upstream CVS [libexif/exif-data.c, CAN-2005-0664]


stable/main/binary-alpha/libexif-dev_0.5.0-1woody1_alpha.deb
stable/main/binary-alpha/libexif5_0.5.0-1woody1_alpha.deb
libexif (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Sylvain Defresne, partially also present in
    upstream CVS [libexif/exif-data.c, CAN-2005-0664]


stable/main/source/libexif_0.5.0-1woody1.dsc
stable/main/binary-arm/libexif5_0.5.0-1woody1_arm.deb
stable/main/binary-arm/libexif-dev_0.5.0-1woody1_arm.deb
stable/main/source/libexif_0.5.0-1woody1.diff.gz
libexif (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Sylvain Defresne, partially also present in
    upstream CVS [libexif/exif-data.c, CAN-2005-0664]


stable/main/binary-sparc/libconvert-uulib-perl_0.201-2woody1_sparc.deb
libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c,
    CAN-2005-1349]


stable/main/binary-s390/libconvert-uulib-perl_0.201-2woody1_s390.deb
libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c,
    CAN-2005-1349]


stable/main/binary-powerpc/libconvert-uulib-perl_0.201-2woody1_powerpc.deb
libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c,
    CAN-2005-1349]


stable/main/binary-mipsel/libconvert-uulib-perl_0.201-2woody1_mipsel.deb
libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c,
    CAN-2005-1349]


stable/main/binary-mips/libconvert-uulib-perl_0.201-2woody1_mips.deb
libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c,
    CAN-2005-1349]


stable/main/binary-m68k/libconvert-uulib-perl_0.201-2woody1_m68k.deb
libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c,
    CAN-2005-1349]


stable/main/binary-ia64/libconvert-uulib-perl_0.201-2woody1_ia64.deb
libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c,
    CAN-2005-1349]


stable/main/binary-i386/libconvert-uulib-perl_0.201-2woody1_i386.deb
libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c,
    CAN-2005-1349]


stable/main/binary-hppa/libconvert-uulib-perl_0.201-2woody1_hppa.deb
libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c,
    CAN-2005-1349]


stable/main/binary-alpha/libconvert-uulib-perl_0.201-2woody1_alpha.deb
libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c,
    CAN-2005-1349]


stable/main/source/libconvert-uulib-perl_0.201-2woody1.dsc
stable/main/source/libconvert-uulib-perl_0.201-2woody1.diff.gz
stable/main/binary-arm/libconvert-uulib-perl_0.201-2woody1_arm.deb
libconvert-uulib-perl (0.201-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow [uulib/uunconc.c,
    CAN-2005-1349]


stable/main/binary-sparc/libarts_2.2.2-13.woody.14_sparc.deb
stable/main/binary-sparc/kdelibs-dev_2.2.2-13.woody.14_sparc.deb
stable/main/binary-sparc/libarts-dev_2.2.2-13.woody.14_sparc.deb
stable/main/binary-sparc/libkmid_2.2.2-13.woody.14_sparc.deb
stable/main/binary-sparc/libkmid-alsa_2.2.2-13.woody.14_sparc.deb
stable/main/binary-sparc/libarts-alsa_2.2.2-13.woody.14_sparc.deb
stable/main/binary-sparc/kdelibs3_2.2.2-13.woody.14_sparc.deb
stable/main/binary-sparc/kdelibs3-bin_2.2.2-13.woody.14_sparc.deb
stable/main/binary-sparc/libkmid-dev_2.2.2-13.woody.14_sparc.deb
stable/main/binary-sparc/kdelibs3-cups_2.2.2-13.woody.14_sparc.deb
kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix integer overflow [kimgio/xview.cpp,
    CAN-2005-1046]
  * Backported upstream patch to prevent the use of unallocated memory in
    an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp]


stable/main/binary-s390/kdelibs-dev_2.2.2-13.woody.14_s390.deb
stable/main/binary-s390/kdelibs3-cups_2.2.2-13.woody.14_s390.deb
stable/main/binary-s390/kdelibs3-bin_2.2.2-13.woody.14_s390.deb
stable/main/binary-s390/libkmid-alsa_2.2.2-13.woody.14_s390.deb
stable/main/binary-s390/libarts_2.2.2-13.woody.14_s390.deb
stable/main/binary-s390/libarts-alsa_2.2.2-13.woody.14_s390.deb
stable/main/binary-s390/libarts-dev_2.2.2-13.woody.14_s390.deb
stable/main/binary-s390/libkmid_2.2.2-13.woody.14_s390.deb
stable/main/binary-s390/libkmid-dev_2.2.2-13.woody.14_s390.deb
stable/main/binary-s390/kdelibs3_2.2.2-13.woody.14_s390.deb
kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix integer overflow [kimgio/xview.cpp,
    CAN-2005-1046]
  * Backported upstream patch to prevent the use of unallocated memory in
    an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp]


stable/main/binary-powerpc/libkmid_2.2.2-13.woody.14_powerpc.deb
stable/main/binary-powerpc/libkmid-dev_2.2.2-13.woody.14_powerpc.deb
stable/main/binary-powerpc/libkmid-alsa_2.2.2-13.woody.14_powerpc.deb
stable/main/binary-powerpc/kdelibs3_2.2.2-13.woody.14_powerpc.deb
stable/main/binary-powerpc/libarts-alsa_2.2.2-13.woody.14_powerpc.deb
stable/main/binary-powerpc/libarts-dev_2.2.2-13.woody.14_powerpc.deb
stable/main/binary-powerpc/kdelibs3-cups_2.2.2-13.woody.14_powerpc.deb
stable/main/binary-powerpc/kdelibs3-bin_2.2.2-13.woody.14_powerpc.deb
stable/main/binary-powerpc/libarts_2.2.2-13.woody.14_powerpc.deb
stable/main/binary-powerpc/kdelibs-dev_2.2.2-13.woody.14_powerpc.deb
kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix integer overflow [kimgio/xview.cpp,
    CAN-2005-1046]
  * Backported upstream patch to prevent the use of unallocated memory in
    an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp]


stable/main/binary-mipsel/libkmid-dev_2.2.2-13.woody.14_mipsel.deb
stable/main/binary-mipsel/kdelibs3-cups_2.2.2-13.woody.14_mipsel.deb
stable/main/binary-mipsel/kdelibs3-bin_2.2.2-13.woody.14_mipsel.deb
stable/main/binary-mipsel/libarts-dev_2.2.2-13.woody.14_mipsel.deb
stable/main/binary-mipsel/kdelibs-dev_2.2.2-13.woody.14_mipsel.deb
stable/main/binary-mipsel/libkmid_2.2.2-13.woody.14_mipsel.deb
stable/main/binary-mipsel/libarts-alsa_2.2.2-13.woody.14_mipsel.deb
stable/main/binary-mipsel/kdelibs3_2.2.2-13.woody.14_mipsel.deb
stable/main/binary-mipsel/libkmid-alsa_2.2.2-13.woody.14_mipsel.deb
stable/main/binary-mipsel/libarts_2.2.2-13.woody.14_mipsel.deb
kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix integer overflow [kimgio/xview.cpp,
    CAN-2005-1046]
  * Backported upstream patch to prevent the use of unallocated memory in
    an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp]


stable/main/binary-mips/kdelibs3_2.2.2-13.woody.14_mips.deb
stable/main/binary-mips/libarts_2.2.2-13.woody.14_mips.deb
stable/main/binary-mips/libarts-alsa_2.2.2-13.woody.14_mips.deb
stable/main/binary-mips/libkmid_2.2.2-13.woody.14_mips.deb
stable/main/binary-mips/kdelibs3-cups_2.2.2-13.woody.14_mips.deb
stable/main/binary-mips/libkmid-dev_2.2.2-13.woody.14_mips.deb
stable/main/binary-mips/libarts-dev_2.2.2-13.woody.14_mips.deb
stable/main/binary-mips/kdelibs3-bin_2.2.2-13.woody.14_mips.deb
stable/main/binary-mips/libkmid-alsa_2.2.2-13.woody.14_mips.deb
stable/main/binary-mips/kdelibs-dev_2.2.2-13.woody.14_mips.deb
kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix integer overflow [kimgio/xview.cpp,
    CAN-2005-1046]
  * Backported upstream patch to prevent the use of unallocated memory in
    an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp]


stable/main/binary-m68k/kdelibs3_2.2.2-13.woody.14_m68k.deb
stable/main/binary-m68k/libarts-dev_2.2.2-13.woody.14_m68k.deb
stable/main/binary-m68k/libkmid-dev_2.2.2-13.woody.14_m68k.deb
stable/main/binary-m68k/kdelibs-dev_2.2.2-13.woody.14_m68k.deb
stable/main/binary-m68k/libarts_2.2.2-13.woody.14_m68k.deb
stable/main/binary-m68k/libkmid_2.2.2-13.woody.14_m68k.deb
stable/main/binary-m68k/kdelibs3-cups_2.2.2-13.woody.14_m68k.deb
stable/main/binary-m68k/libkmid-alsa_2.2.2-13.woody.14_m68k.deb
stable/main/binary-m68k/libarts-alsa_2.2.2-13.woody.14_m68k.deb
stable/main/binary-m68k/kdelibs3-bin_2.2.2-13.woody.14_m68k.deb
kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix integer overflow [kimgio/xview.cpp,
    CAN-2005-1046]
  * Backported upstream patch to prevent the use of unallocated memory in
    an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp]


stable/main/binary-ia64/libkmid-dev_2.2.2-13.woody.14_ia64.deb
stable/main/binary-ia64/kdelibs3-cups_2.2.2-13.woody.14_ia64.deb
stable/main/binary-ia64/kdelibs-dev_2.2.2-13.woody.14_ia64.deb
stable/main/binary-ia64/kdelibs3_2.2.2-13.woody.14_ia64.deb
stable/main/binary-ia64/libarts-alsa_2.2.2-13.woody.14_ia64.deb
stable/main/binary-ia64/libarts_2.2.2-13.woody.14_ia64.deb
stable/main/binary-ia64/libkmid_2.2.2-13.woody.14_ia64.deb
stable/main/binary-ia64/libkmid-alsa_2.2.2-13.woody.14_ia64.deb
stable/main/binary-ia64/kdelibs3-bin_2.2.2-13.woody.14_ia64.deb
stable/main/binary-ia64/libarts-dev_2.2.2-13.woody.14_ia64.deb
kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix integer overflow [kimgio/xview.cpp,
    CAN-2005-1046]
  * Backported upstream patch to prevent the use of unallocated memory in
    an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp]


stable/main/binary-i386/libarts-alsa_2.2.2-13.woody.14_i386.deb
stable/main/binary-i386/libkmid-alsa_2.2.2-13.woody.14_i386.deb
stable/main/binary-i386/libkmid_2.2.2-13.woody.14_i386.deb
stable/main/binary-i386/kdelibs3_2.2.2-13.woody.14_i386.deb
stable/main/binary-i386/libkmid-dev_2.2.2-13.woody.14_i386.deb
stable/main/binary-i386/kdelibs-dev_2.2.2-13.woody.14_i386.deb
stable/main/binary-i386/libarts_2.2.2-13.woody.14_i386.deb
stable/main/binary-i386/kdelibs3-bin_2.2.2-13.woody.14_i386.deb
stable/main/binary-i386/libarts-dev_2.2.2-13.woody.14_i386.deb
stable/main/binary-i386/kdelibs3-cups_2.2.2-13.woody.14_i386.deb
kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix integer overflow [kimgio/xview.cpp,
    CAN-2005-1046]
  * Backported upstream patch to prevent the use of unallocated memory in
    an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp]


stable/main/binary-hppa/libarts-dev_2.2.2-13.woody.14_hppa.deb
stable/main/binary-hppa/kdelibs3-bin_2.2.2-13.woody.14_hppa.deb
stable/main/binary-hppa/libkmid-alsa_2.2.2-13.woody.14_hppa.deb
stable/main/binary-hppa/kdelibs3_2.2.2-13.woody.14_hppa.deb
stable/main/binary-hppa/libarts_2.2.2-13.woody.14_hppa.deb
stable/main/binary-hppa/libkmid-dev_2.2.2-13.woody.14_hppa.deb
stable/main/binary-hppa/libarts-alsa_2.2.2-13.woody.14_hppa.deb
stable/main/binary-hppa/kdelibs3-cups_2.2.2-13.woody.14_hppa.deb
stable/main/binary-hppa/kdelibs-dev_2.2.2-13.woody.14_hppa.deb
stable/main/binary-hppa/libkmid_2.2.2-13.woody.14_hppa.deb
kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix integer overflow [kimgio/xview.cpp,
    CAN-2005-1046]
  * Backported upstream patch to prevent the use of unallocated memory in
    an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp]


stable/main/binary-alpha/libarts_2.2.2-13.woody.14_alpha.deb
stable/main/binary-alpha/kdelibs-dev_2.2.2-13.woody.14_alpha.deb
stable/main/binary-alpha/kdelibs3-cups_2.2.2-13.woody.14_alpha.deb
stable/main/binary-alpha/kdelibs3-bin_2.2.2-13.woody.14_alpha.deb
stable/main/binary-alpha/libarts-dev_2.2.2-13.woody.14_alpha.deb
stable/main/binary-alpha/libkmid-dev_2.2.2-13.woody.14_alpha.deb
stable/main/binary-alpha/libkmid-alsa_2.2.2-13.woody.14_alpha.deb
stable/main/binary-alpha/libkmid_2.2.2-13.woody.14_alpha.deb
stable/main/binary-alpha/libarts-alsa_2.2.2-13.woody.14_alpha.deb
stable/main/binary-alpha/kdelibs3_2.2.2-13.woody.14_alpha.deb
kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix integer overflow [kimgio/xview.cpp,
    CAN-2005-1046]
  * Backported upstream patch to prevent the use of unallocated memory in
    an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp]


stable/main/binary-arm/libarts-dev_2.2.2-13.woody.14_arm.deb
stable/main/binary-arm/kdelibs3-cups_2.2.2-13.woody.14_arm.deb
stable/main/binary-arm/libkmid_2.2.2-13.woody.14_arm.deb
stable/main/source/kdelibs_2.2.2-13.woody.14.dsc
stable/main/binary-arm/libkmid-alsa_2.2.2-13.woody.14_arm.deb
stable/main/binary-arm/kdelibs-dev_2.2.2-13.woody.14_arm.deb
stable/main/binary-arm/libarts-alsa_2.2.2-13.woody.14_arm.deb
stable/main/binary-arm/libarts_2.2.2-13.woody.14_arm.deb
stable/main/binary-arm/kdelibs3_2.2.2-13.woody.14_arm.deb
stable/main/binary-arm/kdelibs3-bin_2.2.2-13.woody.14_arm.deb
stable/main/binary-arm/libkmid-dev_2.2.2-13.woody.14_arm.deb
stable/main/binary-all/kdelibs3-doc_2.2.2-13.woody.14_all.deb
stable/main/source/kdelibs_2.2.2-13.woody.14.diff.gz
kdelibs (4:2.2.2-13.woody.14) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix integer overflow [kimgio/xview.cpp,
    CAN-2005-1046]
  * Backported upstream patch to prevent the use of unallocated memory in
    an OOM situation [kimgio/tiffr.cpp, kimgio/xview.cpp]


stable/main/binary-sparc/junkbuster_2.0.2-0.2woody1_sparc.deb
junkbuster (2.0.2-0.2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by James Ranson to fix overwriting of the Referrer
    variable [filters.c, CAN-2005-1108]
  * Corrected use of strsav() to prevent a heap overflow error [filters.c,
    CAN-2005-1109]


stable/main/binary-s390/junkbuster_2.0.2-0.2woody1_s390.deb
junkbuster (2.0.2-0.2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by James Ranson to fix overwriting of the Referrer
    variable [filters.c, CAN-2005-1108]
  * Corrected use of strsav() to prevent a heap overflow error [filters.c,
    CAN-2005-1109]


stable/main/binary-powerpc/junkbuster_2.0.2-0.2woody1_powerpc.deb
junkbuster (2.0.2-0.2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by James Ranson to fix overwriting of the Referrer
    variable [filters.c, CAN-2005-1108]
  * Corrected use of strsav() to prevent a heap overflow error [filters.c,
    CAN-2005-1109]


stable/main/binary-mipsel/junkbuster_2.0.2-0.2woody1_mipsel.deb
junkbuster (2.0.2-0.2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by James Ranson to fix overwriting of the Referrer
    variable [filters.c, CAN-2005-1108]
  * Corrected use of strsav() to prevent a heap overflow error [filters.c,
    CAN-2005-1109]


stable/main/binary-mips/junkbuster_2.0.2-0.2woody1_mips.deb
junkbuster (2.0.2-0.2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by James Ranson to fix overwriting of the Referrer
    variable [filters.c, CAN-2005-1108]
  * Corrected use of strsav() to prevent a heap overflow error [filters.c,
    CAN-2005-1109]


stable/main/binary-m68k/junkbuster_2.0.2-0.2woody1_m68k.deb
junkbuster (2.0.2-0.2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by James Ranson to fix overwriting of the Referrer
    variable [filters.c, CAN-2005-1108]
  * Corrected use of strsav() to prevent a heap overflow error [filters.c,
    CAN-2005-1109]


stable/main/binary-ia64/junkbuster_2.0.2-0.2woody1_ia64.deb
junkbuster (2.0.2-0.2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by James Ranson to fix overwriting of the Referrer
    variable [filters.c, CAN-2005-1108]
  * Corrected use of strsav() to prevent a heap overflow error [filters.c,
    CAN-2005-1109]


stable/main/binary-i386/junkbuster_2.0.2-0.2woody1_i386.deb
junkbuster (2.0.2-0.2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by James Ranson to fix overwriting of the Referrer
    variable [filters.c, CAN-2005-1108]
  * Corrected use of strsav() to prevent a heap overflow error [filters.c,
    CAN-2005-1109]


stable/main/binary-hppa/junkbuster_2.0.2-0.2woody1_hppa.deb
junkbuster (2.0.2-0.2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by James Ranson to fix overwriting of the Referrer
    variable [filters.c, CAN-2005-1108]
  * Corrected use of strsav() to prevent a heap overflow error [filters.c,
    CAN-2005-1109]


stable/main/binary-alpha/junkbuster_2.0.2-0.2woody1_alpha.deb
junkbuster (2.0.2-0.2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by James Ranson to fix overwriting of the Referrer
    variable [filters.c, CAN-2005-1108]
  * Corrected use of strsav() to prevent a heap overflow error [filters.c,
    CAN-2005-1109]


stable/main/binary-arm/junkbuster_2.0.2-0.2woody1_arm.deb
stable/main/source/junkbuster_2.0.2-0.2woody1.dsc
stable/main/source/junkbuster_2.0.2-0.2woody1.diff.gz
junkbuster (2.0.2-0.2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by James Ranson to fix overwriting of the Referrer
    variable [filters.c, CAN-2005-1108]
  * Corrected use of strsav() to prevent a heap overflow error [filters.c,
    CAN-2005-1109]


stable/main/source/info2www_1.2.2.9-20woody1.diff.gz
stable/main/source/info2www_1.2.2.9-20woody1.dsc
stable/main/binary-all/info2www_1.2.2.9-20woody1_all.deb
info2www (1.2.2.9-20woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Uwe Hermann and Justin Pryzby to fix a cross-site
    scripting vulnerability [info2www, CAN-2004-1341]


stable/main/binary-sparc/libgtkhtml-dev_1.0.2-1.woody1_sparc.deb
stable/main/binary-sparc/gtkhtml_1.0.2-1.woody1_sparc.deb
stable/main/binary-sparc/libgtkhtml20_1.0.2-1.woody1_sparc.deb
gtkhtml (1.0.2-1.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Mandrake patch to fix denial of service [src/htmltextslave.c,
    CAN-2003-0541]


stable/main/binary-s390/libgtkhtml20_1.0.2-1.woody1_s390.deb
stable/main/binary-s390/gtkhtml_1.0.2-1.woody1_s390.deb
stable/main/binary-s390/libgtkhtml-dev_1.0.2-1.woody1_s390.deb
gtkhtml (1.0.2-1.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Mandrake patch to fix denial of service [src/htmltextslave.c,
    CAN-2003-0541]


stable/main/binary-powerpc/gtkhtml_1.0.2-1.woody1_powerpc.deb
stable/main/binary-powerpc/libgtkhtml-dev_1.0.2-1.woody1_powerpc.deb
stable/main/binary-powerpc/libgtkhtml20_1.0.2-1.woody1_powerpc.deb
gtkhtml (1.0.2-1.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Mandrake patch to fix denial of service [src/htmltextslave.c,
    CAN-2003-0541]


stable/main/binary-mipsel/libgtkhtml20_1.0.2-1.woody1_mipsel.deb
stable/main/binary-mipsel/libgtkhtml-dev_1.0.2-1.woody1_mipsel.deb
stable/main/binary-mipsel/gtkhtml_1.0.2-1.woody1_mipsel.deb
gtkhtml (1.0.2-1.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Mandrake patch to fix denial of service [src/htmltextslave.c,
    CAN-2003-0541]


stable/main/binary-mips/libgtkhtml20_1.0.2-1.woody1_mips.deb
stable/main/binary-mips/gtkhtml_1.0.2-1.woody1_mips.deb
stable/main/binary-mips/libgtkhtml-dev_1.0.2-1.woody1_mips.deb
gtkhtml (1.0.2-1.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Mandrake patch to fix denial of service [src/htmltextslave.c,
    CAN-2003-0541]


stable/main/binary-m68k/gtkhtml_1.0.2-1.woody1_m68k.deb
stable/main/binary-m68k/libgtkhtml20_1.0.2-1.woody1_m68k.deb
stable/main/binary-m68k/libgtkhtml-dev_1.0.2-1.woody1_m68k.deb
gtkhtml (1.0.2-1.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Mandrake patch to fix denial of service [src/htmltextslave.c,
    CAN-2003-0541]


stable/main/binary-ia64/libgtkhtml20_1.0.2-1.woody1_ia64.deb
stable/main/binary-ia64/libgtkhtml-dev_1.0.2-1.woody1_ia64.deb
stable/main/binary-ia64/gtkhtml_1.0.2-1.woody1_ia64.deb
gtkhtml (1.0.2-1.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Mandrake patch to fix denial of service [src/htmltextslave.c,
    CAN-2003-0541]


stable/main/binary-i386/libgtkhtml-dev_1.0.2-1.woody1_i386.deb
stable/main/binary-i386/gtkhtml_1.0.2-1.woody1_i386.deb
stable/main/binary-i386/libgtkhtml20_1.0.2-1.woody1_i386.deb
gtkhtml (1.0.2-1.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Mandrake patch to fix denial of service [src/htmltextslave.c,
    CAN-2003-0541]


stable/main/binary-hppa/gtkhtml_1.0.2-1.woody1_hppa.deb
stable/main/binary-hppa/libgtkhtml20_1.0.2-1.woody1_hppa.deb
stable/main/binary-hppa/libgtkhtml-dev_1.0.2-1.woody1_hppa.deb
gtkhtml (1.0.2-1.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Mandrake patch to fix denial of service [src/htmltextslave.c,
    CAN-2003-0541]


stable/main/binary-alpha/libgtkhtml20_1.0.2-1.woody1_alpha.deb
stable/main/binary-alpha/libgtkhtml-dev_1.0.2-1.woody1_alpha.deb
stable/main/binary-alpha/gtkhtml_1.0.2-1.woody1_alpha.deb
gtkhtml (1.0.2-1.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Mandrake patch to fix denial of service [src/htmltextslave.c,
    CAN-2003-0541]


stable/main/binary-all/libgtkhtml-data_1.0.2-1.woody1_all.deb
stable/main/binary-arm/libgtkhtml-dev_1.0.2-1.woody1_arm.deb
stable/main/binary-arm/libgtkhtml20_1.0.2-1.woody1_arm.deb
stable/main/source/gtkhtml_1.0.2-1.woody1.diff.gz
stable/main/binary-arm/gtkhtml_1.0.2-1.woody1_arm.deb
stable/main/source/gtkhtml_1.0.2-1.woody1.dsc
gtkhtml (1.0.2-1.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Mandrake patch to fix denial of service [src/htmltextslave.c,
    CAN-2003-0541]


stable/main/binary-sparc/gwtp_4.06-2woody1_sparc.deb
stable/main/binary-sparc/geneweb_4.06-2woody1_sparc.deb
geneweb (4.06-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed automatic conversion of older .gwb database files that turned
    out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405]


stable/main/binary-s390/geneweb_4.06-2woody1_s390.deb
stable/main/binary-s390/gwtp_4.06-2woody1_s390.deb
geneweb (4.06-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed automatic conversion of older .gwb database files that turned
    out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405]


stable/main/binary-powerpc/gwtp_4.06-2woody1_powerpc.deb
stable/main/binary-powerpc/geneweb_4.06-2woody1_powerpc.deb
geneweb (4.06-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed automatic conversion of older .gwb database files that turned
    out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405]


stable/main/binary-mipsel/geneweb_4.06-2woody1_mipsel.deb
stable/main/binary-mipsel/gwtp_4.06-2woody1_mipsel.deb
geneweb (4.06-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed automatic conversion of older .gwb database files that turned
    out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405]


stable/main/binary-mips/geneweb_4.06-2woody1_mips.deb
stable/main/binary-mips/gwtp_4.06-2woody1_mips.deb
geneweb (4.06-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed automatic conversion of older .gwb database files that turned
    out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405]


stable/main/binary-m68k/gwtp_4.06-2woody1_m68k.deb
stable/main/binary-m68k/geneweb_4.06-2woody1_m68k.deb
geneweb (4.06-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed automatic conversion of older .gwb database files that turned
    out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405]


stable/main/binary-ia64/geneweb_4.06-2woody1_ia64.deb
stable/main/binary-ia64/gwtp_4.06-2woody1_ia64.deb
geneweb (4.06-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed automatic conversion of older .gwb database files that turned
    out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405]


stable/main/binary-i386/gwtp_4.06-2woody1_i386.deb
stable/main/binary-i386/geneweb_4.06-2woody1_i386.deb
geneweb (4.06-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed automatic conversion of older .gwb database files that turned
    out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405]


stable/main/binary-hppa/geneweb_4.06-2woody1_hppa.deb
stable/main/binary-hppa/gwtp_4.06-2woody1_hppa.deb
geneweb (4.06-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed automatic conversion of older .gwb database files that turned
    out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405]


stable/main/binary-alpha/geneweb_4.06-2woody1_alpha.deb
stable/main/binary-alpha/gwtp_4.06-2woody1_alpha.deb
geneweb (4.06-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed automatic conversion of older .gwb database files that turned
    out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405]


stable/main/binary-arm/geneweb_4.06-2woody1_arm.deb
stable/main/source/geneweb_4.06-2woody1.diff.gz
stable/main/source/geneweb_4.06-2woody1.dsc
stable/main/binary-arm/gwtp_4.06-2woody1_arm.deb
geneweb (4.06-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed automatic conversion of older .gwb database files that turned
    out to be unsafe [debian/geneweb.prerm, CAN-2005-0391, Bug#304405]


stable/main/binary-sparc/gaim-common_0.58-2.5_sparc.deb
stable/main/binary-sparc/gaim_0.58-2.5_sparc.deb
stable/main/binary-sparc/gaim-gnome_0.58-2.5_sparc.deb
gaim (1:0.58-2.5) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied backported upstream patch to fix denial of service
    [src/protocols/oscar/aim.h, src/protocols/oscar/im.c,
    src/protocols/oscar/rxqueue.c, CAN-2005-0472]
  * Thanks a lot to Robert McQueen


stable/main/binary-s390/gaim-gnome_0.58-2.5_s390.deb
stable/main/binary-s390/gaim_0.58-2.5_s390.deb
stable/main/binary-s390/gaim-common_0.58-2.5_s390.deb
gaim (1:0.58-2.5) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied backported upstream patch to fix denial of service
    [src/protocols/oscar/aim.h, src/protocols/oscar/im.c,
    src/protocols/oscar/rxqueue.c, CAN-2005-0472]
  * Thanks a lot to Robert McQueen


stable/main/binary-powerpc/gaim-common_0.58-2.5_powerpc.deb
stable/main/binary-powerpc/gaim-gnome_0.58-2.5_powerpc.deb
stable/main/binary-powerpc/gaim_0.58-2.5_powerpc.deb
gaim (1:0.58-2.5) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied backported upstream patch to fix denial of service
    [src/protocols/oscar/aim.h, src/protocols/oscar/im.c,
    src/protocols/oscar/rxqueue.c, CAN-2005-0472]
  * Thanks a lot to Robert McQueen


stable/main/binary-mips/gaim_0.58-2.5_mips.deb
stable/main/binary-mips/gaim-common_0.58-2.5_mips.deb
stable/main/binary-mips/gaim-gnome_0.58-2.5_mips.deb
gaim (1:0.58-2.5) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied backported upstream patch to fix denial of service
    [src/protocols/oscar/aim.h, src/protocols/oscar/im.c,
    src/protocols/oscar/rxqueue.c, CAN-2005-0472]
  * Thanks a lot to Robert McQueen


stable/main/binary-m68k/gaim-gnome_0.58-2.5_m68k.deb
stable/main/binary-m68k/gaim_0.58-2.5_m68k.deb
stable/main/binary-m68k/gaim-common_0.58-2.5_m68k.deb
gaim (1:0.58-2.5) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied backported upstream patch to fix denial of service
    [src/protocols/oscar/aim.h, src/protocols/oscar/im.c,
    src/protocols/oscar/rxqueue.c, CAN-2005-0472]
  * Thanks a lot to Robert McQueen


stable/main/binary-ia64/gaim-gnome_0.58-2.5_ia64.deb
stable/main/binary-ia64/gaim-common_0.58-2.5_ia64.deb
stable/main/binary-ia64/gaim_0.58-2.5_ia64.deb
gaim (1:0.58-2.5) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied backported upstream patch to fix denial of service
    [src/protocols/oscar/aim.h, src/protocols/oscar/im.c,
    src/protocols/oscar/rxqueue.c, CAN-2005-0472]
  * Thanks a lot to Robert McQueen


stable/main/binary-i386/gaim-common_0.58-2.5_i386.deb
stable/main/binary-i386/gaim_0.58-2.5_i386.deb
stable/main/binary-i386/gaim-gnome_0.58-2.5_i386.deb
gaim (1:0.58-2.5) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied backported upstream patch to fix denial of service
    [src/protocols/oscar/aim.h, src/protocols/oscar/im.c,
    src/protocols/oscar/rxqueue.c, CAN-2005-0472]
  * Thanks a lot to Robert McQueen


stable/main/binary-hppa/gaim_0.58-2.5_hppa.deb
stable/main/binary-hppa/gaim-gnome_0.58-2.5_hppa.deb
stable/main/binary-hppa/gaim-common_0.58-2.5_hppa.deb
gaim (1:0.58-2.5) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied backported upstream patch to fix denial of service
    [src/protocols/oscar/aim.h, src/protocols/oscar/im.c,
    src/protocols/oscar/rxqueue.c, CAN-2005-0472]
  * Thanks a lot to Robert McQueen


stable/main/binary-arm/gaim_0.58-2.5_arm.deb
stable/main/binary-arm/gaim-gnome_0.58-2.5_arm.deb
stable/main/binary-arm/gaim-common_0.58-2.5_arm.deb
gaim (1:0.58-2.5) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied backported upstream patch to fix denial of service
    [src/protocols/oscar/aim.h, src/protocols/oscar/im.c,
    src/protocols/oscar/rxqueue.c, CAN-2005-0472]
  * Thanks a lot to Robert McQueen


stable/main/binary-alpha/gaim_0.58-2.5_alpha.deb
stable/main/binary-alpha/gaim-gnome_0.58-2.5_alpha.deb
stable/main/binary-alpha/gaim-common_0.58-2.5_alpha.deb
gaim (1:0.58-2.5) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied backported upstream patch to fix denial of service
    [src/protocols/oscar/aim.h, src/protocols/oscar/im.c,
    src/protocols/oscar/rxqueue.c, CAN-2005-0472]
  * Thanks a lot to Robert McQueen


stable/main/source/gaim_0.58-2.5.diff.gz
stable/main/binary-mipsel/gaim-common_0.58-2.5_mipsel.deb
stable/main/binary-mipsel/gaim_0.58-2.5_mipsel.deb
stable/main/source/gaim_0.58-2.5.dsc
stable/main/binary-mipsel/gaim-gnome_0.58-2.5_mipsel.deb
gaim (1:0.58-2.5) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied backported upstream patch to fix denial of service
    [src/protocols/oscar/aim.h, src/protocols/oscar/im.c,
    src/protocols/oscar/rxqueue.c, CAN-2005-0472]
  * Thanks a lot to Robert McQueen


stable/main/binary-sparc/f2c_20010821-3.2_sparc.deb
f2c (20010821-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to create proper temporary files by not shadowing
    global scope variables with local scope ones.  Thanks to Dan McMahill
    from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c,
    CAN-2005-0017]


stable/main/binary-s390/f2c_20010821-3.2_s390.deb
f2c (20010821-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to create proper temporary files by not shadowing
    global scope variables with local scope ones.  Thanks to Dan McMahill
    from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c,
    CAN-2005-0017]


stable/main/binary-powerpc/f2c_20010821-3.2_powerpc.deb
f2c (20010821-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to create proper temporary files by not shadowing
    global scope variables with local scope ones.  Thanks to Dan McMahill
    from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c,
    CAN-2005-0017]


stable/main/binary-mipsel/f2c_20010821-3.2_mipsel.deb
f2c (20010821-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to create proper temporary files by not shadowing
    global scope variables with local scope ones.  Thanks to Dan McMahill
    from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c,
    CAN-2005-0017]


stable/main/binary-mips/f2c_20010821-3.2_mips.deb
f2c (20010821-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to create proper temporary files by not shadowing
    global scope variables with local scope ones.  Thanks to Dan McMahill
    from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c,
    CAN-2005-0017]


stable/main/binary-m68k/f2c_20010821-3.2_m68k.deb
f2c (20010821-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to create proper temporary files by not shadowing
    global scope variables with local scope ones.  Thanks to Dan McMahill
    from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c,
    CAN-2005-0017]


stable/main/binary-ia64/f2c_20010821-3.2_ia64.deb
f2c (20010821-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to create proper temporary files by not shadowing
    global scope variables with local scope ones.  Thanks to Dan McMahill
    from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c,
    CAN-2005-0017]


stable/main/binary-i386/f2c_20010821-3.2_i386.deb
f2c (20010821-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to create proper temporary files by not shadowing
    global scope variables with local scope ones.  Thanks to Dan McMahill
    from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c,
    CAN-2005-0017]


stable/main/binary-hppa/f2c_20010821-3.2_hppa.deb
f2c (20010821-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to create proper temporary files by not shadowing
    global scope variables with local scope ones.  Thanks to Dan McMahill
    from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c,
    CAN-2005-0017]


stable/main/binary-alpha/f2c_20010821-3.2_alpha.deb
f2c (20010821-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to create proper temporary files by not shadowing
    global scope variables with local scope ones.  Thanks to Dan McMahill
    from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c,
    CAN-2005-0017]


stable/main/binary-arm/f2c_20010821-3.2_arm.deb
stable/main/source/f2c_20010821-3.2.dsc
stable/main/source/f2c_20010821-3.2.diff.gz
f2c (20010821-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to create proper temporary files by not shadowing
    global scope variables with local scope ones.  Thanks to Dan McMahill
    from NetBSD [src/sysdep.c, patches/patch.CAN-2005-0017.f2c,
    CAN-2005-0017]


stable/main/binary-sparc/tethereal_0.9.4-1woody12_sparc.deb
stable/main/binary-sparc/ethereal-common_0.9.4-1woody12_sparc.deb
stable/main/binary-sparc/ethereal-dev_0.9.4-1woody12_sparc.deb
stable/main/binary-sparc/ethereal_0.9.4-1woody12_sparc.deb
ethereal (0.9.4-1woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflow in the IAPP dissector
    <http://anonsvn.ethereal.com/viewcvs/viewcvs.py?view=rev&rev=13707>
    [packet-iapp.c, CAN-2005-0739]


stable/main/binary-s390/ethereal_0.9.4-1woody12_s390.deb
stable/main/binary-s390/tethereal_0.9.4-1woody12_s390.deb
stable/main/binary-s390/ethereal-common_0.9.4-1woody12_s390.deb
stable/main/binary-s390/ethereal-dev_0.9.4-1woody12_s390.deb
ethereal (0.9.4-1woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflow in the IAPP dissector
    <http://anonsvn.ethereal.com/viewcvs/viewcvs.py?view=rev&rev=13707>
    [packet-iapp.c, CAN-2005-0739]


stable/main/binary-powerpc/ethereal-common_0.9.4-1woody12_powerpc.deb
stable/main/binary-powerpc/tethereal_0.9.4-1woody12_powerpc.deb
stable/main/binary-powerpc/ethereal-dev_0.9.4-1woody12_powerpc.deb
stable/main/binary-powerpc/ethereal_0.9.4-1woody12_powerpc.deb
ethereal (0.9.4-1woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflow in the IAPP dissector
    <http://anonsvn.ethereal.com/viewcvs/viewcvs.py?view=rev&rev=13707>
    [packet-iapp.c, CAN-2005-0739]


stable/main/binary-mips/ethereal-common_0.9.4-1woody12_mips.deb
stable/main/binary-mips/ethereal_0.9.4-1woody12_mips.deb
stable/main/binary-mips/ethereal-dev_0.9.4-1woody12_mips.deb
stable/main/binary-mips/tethereal_0.9.4-1woody12_mips.deb
ethereal (0.9.4-1woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflow in the IAPP dissector
    <http://anonsvn.ethereal.com/viewcvs/viewcvs.py?view=rev&rev=13707>
    [packet-iapp.c, CAN-2005-0739]


stable/main/binary-m68k/ethereal-dev_0.9.4-1woody12_m68k.deb
stable/main/binary-m68k/ethereal_0.9.4-1woody12_m68k.deb
stable/main/binary-m68k/ethereal-common_0.9.4-1woody12_m68k.deb
stable/main/binary-m68k/tethereal_0.9.4-1woody12_m68k.deb
ethereal (0.9.4-1woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflow in the IAPP dissector
    <http://anonsvn.ethereal.com/viewcvs/viewcvs.py?view=rev&rev=13707>
    [packet-iapp.c, CAN-2005-0739]


stable/main/binary-ia64/ethereal_0.9.4-1woody12_ia64.deb
stable/main/binary-ia64/ethereal-common_0.9.4-1woody12_ia64.deb
stable/main/binary-ia64/ethereal-dev_0.9.4-1woody12_ia64.deb
stable/main/binary-ia64/tethereal_0.9.4-1woody12_ia64.deb
ethereal (0.9.4-1woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflow in the IAPP dissector
    <http://anonsvn.ethereal.com/viewcvs/viewcvs.py?view=rev&rev=13707>
    [packet-iapp.c, CAN-2005-0739]


stable/main/binary-i386/tethereal_0.9.4-1woody12_i386.deb
stable/main/binary-i386/ethereal-dev_0.9.4-1woody12_i386.deb
stable/main/binary-i386/ethereal_0.9.4-1woody12_i386.deb
stable/main/binary-i386/ethereal-common_0.9.4-1woody12_i386.deb
ethereal (0.9.4-1woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflow in the IAPP dissector
    <http://anonsvn.ethereal.com/viewcvs/viewcvs.py?view=rev&rev=13707>
    [packet-iapp.c, CAN-2005-0739]


stable/main/binary-hppa/ethereal-common_0.9.4-1woody12_hppa.deb
stable/main/binary-hppa/ethereal-dev_0.9.4-1woody12_hppa.deb
stable/main/binary-hppa/ethereal_0.9.4-1woody12_hppa.deb
stable/main/binary-hppa/tethereal_0.9.4-1woody12_hppa.deb
ethereal (0.9.4-1woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflow in the IAPP dissector
    <http://anonsvn.ethereal.com/viewcvs/viewcvs.py?view=rev&rev=13707>
    [packet-iapp.c, CAN-2005-0739]


stable/main/binary-arm/ethereal_0.9.4-1woody12_arm.deb
stable/main/binary-arm/tethereal_0.9.4-1woody12_arm.deb
stable/main/binary-arm/ethereal-dev_0.9.4-1woody12_arm.deb
stable/main/binary-arm/ethereal-common_0.9.4-1woody12_arm.deb
ethereal (0.9.4-1woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflow in the IAPP dissector
    <http://anonsvn.ethereal.com/viewcvs/viewcvs.py?view=rev&rev=13707>
    [packet-iapp.c, CAN-2005-0739]


stable/main/binary-alpha/ethereal_0.9.4-1woody12_alpha.deb
stable/main/binary-alpha/ethereal-dev_0.9.4-1woody12_alpha.deb
stable/main/binary-alpha/ethereal-common_0.9.4-1woody12_alpha.deb
stable/main/binary-alpha/tethereal_0.9.4-1woody12_alpha.deb
ethereal (0.9.4-1woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflow in the IAPP dissector
    <http://anonsvn.ethereal.com/viewcvs/viewcvs.py?view=rev&rev=13707>
    [packet-iapp.c, CAN-2005-0739]


stable/main/binary-mipsel/ethereal_0.9.4-1woody12_mipsel.deb
stable/main/source/ethereal_0.9.4-1woody12.dsc
stable/main/source/ethereal_0.9.4-1woody12.diff.gz
stable/main/binary-mipsel/tethereal_0.9.4-1woody12_mipsel.deb
stable/main/binary-mipsel/ethereal-common_0.9.4-1woody12_mipsel.deb
stable/main/binary-mipsel/ethereal-dev_0.9.4-1woody12_mipsel.deb
ethereal (0.9.4-1woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflow in the IAPP dissector
    <http://anonsvn.ethereal.com/viewcvs/viewcvs.py?view=rev&rev=13707>
    [packet-iapp.c, CAN-2005-0739]


stable/main/source/doc-base_0.7.11-0.woody1.dsc
stable/main/source/doc-base_0.7.11-0.woody1.tar.gz
stable/main/binary-all/doc-base_0.7.11-0.woody1_all.deb
doc-base (0.7.11-0.woody1) stable; urgency=low
  * Non-maintainer upload by the release team.
  * Backport the following patch by Steve Langasek
    and Colin Watson to woody:
  * Fix install-docs to not require perl's File::Basename, so that it
    works even when perl is unconfigured.  See #278495.


stable/main/binary-sparc/cvs_1.11.1p1debian-10_sparc.deb
cvs (1.11.1p1debian-10) stable-security; urgency=high
  * Fixes to the cvs-repouid changes:
    + Make sure user passwords are still checked if the cvs-repouids
      file exists. Closes: #260200, CAN-2004-1342
    + Fix potential crash if the cvs-repouids file exists but does not
      contain a mapping for the current repository, CAN-2004-1343
    + debian/patches/80_cvs-repouid-0.1


stable/main/binary-s390/cvs_1.11.1p1debian-10_s390.deb
cvs (1.11.1p1debian-10) stable-security; urgency=high
  * Fixes to the cvs-repouid changes:
    + Make sure user passwords are still checked if the cvs-repouids
      file exists. Closes: #260200, CAN-2004-1342
    + Fix potential crash if the cvs-repouids file exists but does not
      contain a mapping for the current repository, CAN-2004-1343
    + debian/patches/80_cvs-repouid-0.1


stable/main/binary-powerpc/cvs_1.11.1p1debian-10_powerpc.deb
cvs (1.11.1p1debian-10) stable-security; urgency=high
  * Fixes to the cvs-repouid changes:
    + Make sure user passwords are still checked if the cvs-repouids
      file exists. Closes: #260200, CAN-2004-1342
    + Fix potential crash if the cvs-repouids file exists but does not
      contain a mapping for the current repository, CAN-2004-1343
    + debian/patches/80_cvs-repouid-0.1


stable/main/binary-mipsel/cvs_1.11.1p1debian-10_mipsel.deb
cvs (1.11.1p1debian-10) stable-security; urgency=high
  * Fixes to the cvs-repouid changes:
    + Make sure user passwords are still checked if the cvs-repouids
      file exists. Closes: #260200, CAN-2004-1342
    + Fix potential crash if the cvs-repouids file exists but does not
      contain a mapping for the current repository, CAN-2004-1343
    + debian/patches/80_cvs-repouid-0.1


stable/main/binary-mips/cvs_1.11.1p1debian-10_mips.deb
cvs (1.11.1p1debian-10) stable-security; urgency=high
  * Fixes to the cvs-repouid changes:
    + Make sure user passwords are still checked if the cvs-repouids
      file exists. Closes: #260200, CAN-2004-1342
    + Fix potential crash if the cvs-repouids file exists but does not
      contain a mapping for the current repository, CAN-2004-1343
    + debian/patches/80_cvs-repouid-0.1


stable/main/binary-m68k/cvs_1.11.1p1debian-10_m68k.deb
cvs (1.11.1p1debian-10) stable-security; urgency=high
  * Fixes to the cvs-repouid changes:
    + Make sure user passwords are still checked if the cvs-repouids
      file exists. Closes: #260200, CAN-2004-1342
    + Fix potential crash if the cvs-repouids file exists but does not
      contain a mapping for the current repository, CAN-2004-1343
    + debian/patches/80_cvs-repouid-0.1


stable/main/binary-ia64/cvs_1.11.1p1debian-10_ia64.deb
cvs (1.11.1p1debian-10) stable-security; urgency=high
  * Fixes to the cvs-repouid changes:
    + Make sure user passwords are still checked if the cvs-repouids
      file exists. Closes: #260200, CAN-2004-1342
    + Fix potential crash if the cvs-repouids file exists but does not
      contain a mapping for the current repository, CAN-2004-1343
    + debian/patches/80_cvs-repouid-0.1


stable/main/binary-i386/cvs_1.11.1p1debian-10_i386.deb
cvs (1.11.1p1debian-10) stable-security; urgency=high
  * Fixes to the cvs-repouid changes:
    + Make sure user passwords are still checked if the cvs-repouids
      file exists. Closes: #260200, CAN-2004-1342
    + Fix potential crash if the cvs-repouids file exists but does not
      contain a mapping for the current repository, CAN-2004-1343
    + debian/patches/80_cvs-repouid-0.1


stable/main/binary-hppa/cvs_1.11.1p1debian-10_hppa.deb
cvs (1.11.1p1debian-10) stable-security; urgency=high
  * Fixes to the cvs-repouid changes:
    + Make sure user passwords are still checked if the cvs-repouids
      file exists. Closes: #260200, CAN-2004-1342
    + Fix potential crash if the cvs-repouids file exists but does not
      contain a mapping for the current repository, CAN-2004-1343
    + debian/patches/80_cvs-repouid-0.1


stable/main/binary-alpha/cvs_1.11.1p1debian-10_alpha.deb
cvs (1.11.1p1debian-10) stable-security; urgency=high
  * Fixes to the cvs-repouid changes:
    + Make sure user passwords are still checked if the cvs-repouids
      file exists. Closes: #260200, CAN-2004-1342
    + Fix potential crash if the cvs-repouids file exists but does not
      contain a mapping for the current repository, CAN-2004-1343
    + debian/patches/80_cvs-repouid-0.1


stable/main/binary-arm/cvs_1.11.1p1debian-10_arm.deb
stable/main/source/cvs_1.11.1p1debian-10.diff.gz
stable/main/source/cvs_1.11.1p1debian-10.dsc
cvs (1.11.1p1debian-10) stable-security; urgency=high
  * Fixes to the cvs-repouid changes:
    + Make sure user passwords are still checked if the cvs-repouids
      file exists. Closes: #260200, CAN-2004-1342
    + Fix potential crash if the cvs-repouids file exists but does not
      contain a mapping for the current repository, CAN-2004-1343
    + debian/patches/80_cvs-repouid-0.1


stable/main/binary-sparc/libbz2-dev_1.0.2-1.woody2_sparc.deb
stable/main/binary-sparc/libbz2-1.0_1.0.2-1.woody2_sparc.deb
stable/main/binary-sparc/bzip2_1.0.2-1.woody2_sparc.deb
bzip2 (1.0.2-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No changes rebuild because maintainer prevented distribution of
    security fix, thanks a lot!


stable/main/binary-s390/bzip2_1.0.2-1.woody2_s390.deb
stable/main/binary-s390/libbz2-1.0_1.0.2-1.woody2_s390.deb
stable/main/binary-s390/libbz2-dev_1.0.2-1.woody2_s390.deb
bzip2 (1.0.2-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No changes rebuild because maintainer prevented distribution of
    security fix, thanks a lot!


stable/main/binary-powerpc/bzip2_1.0.2-1.woody2_powerpc.deb
stable/main/binary-powerpc/libbz2-dev_1.0.2-1.woody2_powerpc.deb
stable/main/binary-powerpc/libbz2-1.0_1.0.2-1.woody2_powerpc.deb
bzip2 (1.0.2-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No changes rebuild because maintainer prevented distribution of
    security fix, thanks a lot!


stable/main/binary-mipsel/bzip2_1.0.2-1.woody2_mipsel.deb
stable/main/binary-mipsel/libbz2-dev_1.0.2-1.woody2_mipsel.deb
stable/main/binary-mipsel/libbz2-1.0_1.0.2-1.woody2_mipsel.deb
bzip2 (1.0.2-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No changes rebuild because maintainer prevented distribution of
    security fix, thanks a lot!


stable/main/binary-mips/bzip2_1.0.2-1.woody2_mips.deb
stable/main/binary-mips/libbz2-1.0_1.0.2-1.woody2_mips.deb
stable/main/binary-mips/libbz2-dev_1.0.2-1.woody2_mips.deb
bzip2 (1.0.2-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No changes rebuild because maintainer prevented distribution of
    security fix, thanks a lot!


stable/main/binary-m68k/bzip2_1.0.2-1.woody2_m68k.deb
stable/main/binary-m68k/libbz2-dev_1.0.2-1.woody2_m68k.deb
stable/main/binary-m68k/libbz2-1.0_1.0.2-1.woody2_m68k.deb
bzip2 (1.0.2-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No changes rebuild because maintainer prevented distribution of
    security fix, thanks a lot!


stable/main/binary-ia64/bzip2_1.0.2-1.woody2_ia64.deb
stable/main/binary-ia64/libbz2-1.0_1.0.2-1.woody2_ia64.deb
stable/main/binary-ia64/libbz2-dev_1.0.2-1.woody2_ia64.deb
bzip2 (1.0.2-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No changes rebuild because maintainer prevented distribution of
    security fix, thanks a lot!


stable/main/binary-hppa/libbz2-dev_1.0.2-1.woody2_hppa.deb
stable/main/binary-hppa/bzip2_1.0.2-1.woody2_hppa.deb
stable/main/binary-hppa/libbz2-1.0_1.0.2-1.woody2_hppa.deb
bzip2 (1.0.2-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No changes rebuild because maintainer prevented distribution of
    security fix, thanks a lot!


stable/main/binary-arm/libbz2-1.0_1.0.2-1.woody2_arm.deb
stable/main/binary-arm/libbz2-dev_1.0.2-1.woody2_arm.deb
stable/main/binary-arm/bzip2_1.0.2-1.woody2_arm.deb
bzip2 (1.0.2-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No changes rebuild because maintainer prevented distribution of
    security fix, thanks a lot!


stable/main/binary-alpha/bzip2_1.0.2-1.woody2_alpha.deb
stable/main/binary-alpha/libbz2-1.0_1.0.2-1.woody2_alpha.deb
stable/main/binary-alpha/libbz2-dev_1.0.2-1.woody2_alpha.deb
bzip2 (1.0.2-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No changes rebuild because maintainer prevented distribution of
    security fix, thanks a lot!


stable/main/binary-i386/libbz2-dev_1.0.2-1.woody2_i386.deb
stable/main/binary-i386/libbz2-1.0_1.0.2-1.woody2_i386.deb
stable/main/source/bzip2_1.0.2-1.woody2.dsc
stable/main/source/bzip2_1.0.2-1.woody2.diff.gz
stable/main/binary-i386/bzip2_1.0.2-1.woody2_i386.deb
bzip2 (1.0.2-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No changes rebuild because maintainer prevented distribution of
    security fix, thanks a lot!


========================================= 
Fri,  15 Apr 2005 - Debian 3.0r5 released
=========================================
=========================================================================
[Date: Fri, 15 Apr 2005 18:25:38 -0400] [ftpmaster: Joerg Jaspert]
Removed the following packages from stable:

      eemu |   2.34.1-1 | source
eemu-client |   2.34.1-1 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390
Closed bugs: 258921

------------------- Reason -------------------
RoSRM: License violation, Bug#258921
----------------------------------------------
=========================================================================
[Date: Fri, 15 Apr 2005 18:27:40 -0400] [ftpmaster: Joerg Jaspert]
Removed the following packages from stable:

        gg |    0.2.1-2 | source
  gg-gnome |    0.2.1-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc
    gg-gtk |    0.2.1-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc
Closed bugs: 257620

------------------- Reason -------------------
RoSRM: Package can not be used anymore due to protocol changes. Bug#257620
----------------------------------------------
=========================================================================
[Date: Fri, 15 Apr 2005 18:29:06 -0400] [ftpmaster: Joerg Jaspert]
Removed the following packages from stable:

     gstar |      1.0-6 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc
Closed bugs: 252885

------------------- Reason -------------------
RoSRM: GPL licensed with non-free component, hence not distributable Bug#252885
----------------------------------------------
=========================================================================
[Date: Fri, 15 Apr 2005 18:30:44 -0400] [ftpmaster: Joerg Jaspert]
Removed the following packages from stable:

       xzx |  2.9.0-1.1 | source, arm, hppa, i386, ia64, m68k, powerpc, s390
       xzx | 2.9.0-1.1.1 | alpha
Closed bugs: 240941

------------------- Reason -------------------
RoSRM: Unmodifiable - undistributable. Bug#240941
----------------------------------------------
=========================================================================

stable/main/binary-sparc/zip_2.30-5woody2_sparc.deb
zip (2.30-5woody2) stable-security; urgency=medium
  * Fixed buffer overflow in unix.c, which happens when creating archives
    with very long filenames (Bug #279867). This is CAN-2004-1010.
    Semi-official patch by Greg Roelofs, long filenames are now supported.


stable/main/binary-s390/zip_2.30-5woody2_s390.deb
zip (2.30-5woody2) stable-security; urgency=medium
  * Fixed buffer overflow in unix.c, which happens when creating archives
    with very long filenames (Bug #279867). This is CAN-2004-1010.
    Semi-official patch by Greg Roelofs, long filenames are now supported.


stable/main/binary-powerpc/zip_2.30-5woody2_powerpc.deb
zip (2.30-5woody2) stable-security; urgency=medium
  * Fixed buffer overflow in unix.c, which happens when creating archives
    with very long filenames (Bug #279867). This is CAN-2004-1010.
    Semi-official patch by Greg Roelofs, long filenames are now supported.


stable/main/binary-mipsel/zip_2.30-5woody2_mipsel.deb
zip (2.30-5woody2) stable-security; urgency=medium
  * Fixed buffer overflow in unix.c, which happens when creating archives
    with very long filenames (Bug #279867). This is CAN-2004-1010.
    Semi-official patch by Greg Roelofs, long filenames are now supported.


stable/main/binary-mips/zip_2.30-5woody2_mips.deb
zip (2.30-5woody2) stable-security; urgency=medium
  * Fixed buffer overflow in unix.c, which happens when creating archives
    with very long filenames (Bug #279867). This is CAN-2004-1010.
    Semi-official patch by Greg Roelofs, long filenames are now supported.


stable/main/binary-m68k/zip_2.30-5woody2_m68k.deb
zip (2.30-5woody2) stable-security; urgency=medium
  * Fixed buffer overflow in unix.c, which happens when creating archives
    with very long filenames (Bug #279867). This is CAN-2004-1010.
    Semi-official patch by Greg Roelofs, long filenames are now supported.


stable/main/binary-ia64/zip_2.30-5woody2_ia64.deb
zip (2.30-5woody2) stable-security; urgency=medium
  * Fixed buffer overflow in unix.c, which happens when creating archives
    with very long filenames (Bug #279867). This is CAN-2004-1010.
    Semi-official patch by Greg Roelofs, long filenames are now supported.


stable/main/binary-hppa/zip_2.30-5woody2_hppa.deb
zip (2.30-5woody2) stable-security; urgency=medium
  * Fixed buffer overflow in unix.c, which happens when creating archives
    with very long filenames (Bug #279867). This is CAN-2004-1010.
    Semi-official patch by Greg Roelofs, long filenames are now supported.


stable/main/binary-arm/zip_2.30-5woody2_arm.deb
zip (2.30-5woody2) stable-security; urgency=medium
  * Fixed buffer overflow in unix.c, which happens when creating archives
    with very long filenames (Bug #279867). This is CAN-2004-1010.
    Semi-official patch by Greg Roelofs, long filenames are now supported.


stable/main/binary-alpha/zip_2.30-5woody2_alpha.deb
zip (2.30-5woody2) stable-security; urgency=medium
  * Fixed buffer overflow in unix.c, which happens when creating archives
    with very long filenames (Bug #279867). This is CAN-2004-1010.
    Semi-official patch by Greg Roelofs, long filenames are now supported.


stable/main/binary-i386/zip_2.30-5woody2_i386.deb
stable/main/source/zip_2.30-5woody2.diff.gz
stable/main/source/zip_2.30-5woody2.dsc
zip (2.30-5woody2) stable-security; urgency=medium
  * Fixed buffer overflow in unix.c, which happens when creating archives
    with very long filenames (Bug #279867). This is CAN-2004-1010.
    Semi-official patch by Greg Roelofs, long filenames are now supported.


stable/main/binary-sparc/zhcon_0.2-4woody3_sparc.deb
zhcon (1:0.2-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to prevent unauthorised file access
    [src/configfile.cpp, CAN-2005-0072]


stable/main/binary-s390/zhcon_0.2-4woody3_s390.deb
zhcon (1:0.2-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to prevent unauthorised file access
    [src/configfile.cpp, CAN-2005-0072]


stable/main/binary-powerpc/zhcon_0.2-4woody3_powerpc.deb
zhcon (1:0.2-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to prevent unauthorised file access
    [src/configfile.cpp, CAN-2005-0072]


stable/main/binary-mips/zhcon_0.2-4woody3_mips.deb
zhcon (1:0.2-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to prevent unauthorised file access
    [src/configfile.cpp, CAN-2005-0072]


stable/main/binary-m68k/zhcon_0.2-4woody3_m68k.deb
zhcon (1:0.2-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to prevent unauthorised file access
    [src/configfile.cpp, CAN-2005-0072]


stable/main/binary-ia64/zhcon_0.2-4woody3_ia64.deb
zhcon (1:0.2-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to prevent unauthorised file access
    [src/configfile.cpp, CAN-2005-0072]


stable/main/binary-i386/zhcon_0.2-4woody3_i386.deb
zhcon (1:0.2-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to prevent unauthorised file access
    [src/configfile.cpp, CAN-2005-0072]


stable/main/binary-hppa/zhcon_0.2-4woody3_hppa.deb
zhcon (1:0.2-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to prevent unauthorised file access
    [src/configfile.cpp, CAN-2005-0072]


stable/main/binary-arm/zhcon_0.2-4woody3_arm.deb
zhcon (1:0.2-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to prevent unauthorised file access
    [src/configfile.cpp, CAN-2005-0072]


stable/main/binary-alpha/zhcon_0.2-4woody3_alpha.deb
zhcon (1:0.2-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to prevent unauthorised file access
    [src/configfile.cpp, CAN-2005-0072]


stable/main/binary-mipsel/zhcon_0.2-4woody3_mipsel.deb
stable/main/source/zhcon_0.2-4woody3.dsc
stable/main/source/zhcon_0.2-4woody3.diff.gz
zhcon (1:0.2-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to prevent unauthorised file access
    [src/configfile.cpp, CAN-2005-0072]


stable/main/binary-sparc/xviewg_3.2p1.4-16woody2_sparc.deb
stable/main/binary-sparc/xviewg-dev_3.2p1.4-16woody2_sparc.deb
stable/main/binary-sparc/xview-clients_3.2p1.4-16woody2_sparc.deb
stable/main/binary-sparc/olvwm_4.4.3.2p1.4-16woody2_sparc.deb
stable/main/binary-sparc/olwm_3.2p1.4-16woody2_sparc.deb
stable/main/binary-sparc/xview-examples_3.2p1.4-16woody2_sparc.deb
xview (3.2p1.4-16woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076]


stable/main/binary-s390/xview-clients_3.2p1.4-16woody2_s390.deb
stable/main/binary-s390/olvwm_4.4.3.2p1.4-16woody2_s390.deb
stable/main/binary-s390/xview-examples_3.2p1.4-16woody2_s390.deb
stable/main/binary-s390/olwm_3.2p1.4-16woody2_s390.deb
stable/main/binary-s390/xviewg_3.2p1.4-16woody2_s390.deb
stable/main/binary-s390/xviewg-dev_3.2p1.4-16woody2_s390.deb
xview (3.2p1.4-16woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076]


stable/main/binary-powerpc/xviewg-dev_3.2p1.4-16woody2_powerpc.deb
stable/main/binary-powerpc/olwm_3.2p1.4-16woody2_powerpc.deb
stable/main/binary-powerpc/xviewg_3.2p1.4-16woody2_powerpc.deb
stable/main/binary-powerpc/xview-clients_3.2p1.4-16woody2_powerpc.deb
stable/main/binary-powerpc/xview-examples_3.2p1.4-16woody2_powerpc.deb
stable/main/binary-powerpc/olvwm_4.4.3.2p1.4-16woody2_powerpc.deb
xview (3.2p1.4-16woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076]


stable/main/binary-mips/olwm_3.2p1.4-16woody2_mips.deb
stable/main/binary-mips/xview-examples_3.2p1.4-16woody2_mips.deb
stable/main/binary-mips/xview-clients_3.2p1.4-16woody2_mips.deb
stable/main/binary-mips/olvwm_4.4.3.2p1.4-16woody2_mips.deb
stable/main/binary-mips/xviewg-dev_3.2p1.4-16woody2_mips.deb
stable/main/binary-mips/xviewg_3.2p1.4-16woody2_mips.deb
xview (3.2p1.4-16woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076]


stable/main/binary-m68k/xviewg_3.2p1.4-16woody2_m68k.deb
stable/main/binary-m68k/xviewg-dev_3.2p1.4-16woody2_m68k.deb
stable/main/binary-m68k/olvwm_4.4.3.2p1.4-16woody2_m68k.deb
stable/main/binary-m68k/olwm_3.2p1.4-16woody2_m68k.deb
stable/main/binary-m68k/xview-clients_3.2p1.4-16woody2_m68k.deb
stable/main/binary-m68k/xview-examples_3.2p1.4-16woody2_m68k.deb
xview (3.2p1.4-16woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076]


stable/main/binary-i386/xviewg-dev_3.2p1.4-16woody2_i386.deb
stable/main/binary-i386/xview-examples_3.2p1.4-16woody2_i386.deb
stable/main/binary-i386/olvwm_4.4.3.2p1.4-16woody2_i386.deb
stable/main/binary-i386/olwm_3.2p1.4-16woody2_i386.deb
stable/main/binary-i386/xviewg_3.2p1.4-16woody2_i386.deb
stable/main/binary-i386/xview-clients_3.2p1.4-16woody2_i386.deb
xview (3.2p1.4-16woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076]


stable/main/binary-hppa/xviewg-dev_3.2p1.4-16woody2_hppa.deb
stable/main/binary-hppa/olwm_3.2p1.4-16woody2_hppa.deb
stable/main/binary-hppa/olvwm_4.4.3.2p1.4-16woody2_hppa.deb
stable/main/binary-hppa/xview-examples_3.2p1.4-16woody2_hppa.deb
stable/main/binary-hppa/xview-clients_3.2p1.4-16woody2_hppa.deb
stable/main/binary-hppa/xviewg_3.2p1.4-16woody2_hppa.deb
xview (3.2p1.4-16woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076]


stable/main/binary-arm/xview-examples_3.2p1.4-16woody2_arm.deb
stable/main/binary-arm/xview-clients_3.2p1.4-16woody2_arm.deb
stable/main/binary-arm/xviewg-dev_3.2p1.4-16woody2_arm.deb
stable/main/binary-arm/olwm_3.2p1.4-16woody2_arm.deb
stable/main/binary-arm/olvwm_4.4.3.2p1.4-16woody2_arm.deb
stable/main/binary-arm/xviewg_3.2p1.4-16woody2_arm.deb
xview (3.2p1.4-16woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076]


stable/main/binary-alpha/olwm_3.2p1.4-16woody2_alpha.deb
stable/main/binary-alpha/xview-examples_3.2p1.4-16woody2_alpha.deb
stable/main/binary-alpha/olvwm_4.4.3.2p1.4-16woody2_alpha.deb
stable/main/binary-alpha/xview-clients_3.2p1.4-16woody2_alpha.deb
stable/main/binary-alpha/xviewg-dev_3.2p1.4-16woody2_alpha.deb
stable/main/binary-alpha/xviewg_3.2p1.4-16woody2_alpha.deb
xview (3.2p1.4-16woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076]


stable/main/source/xview_3.2p1.4-16woody2.dsc
stable/main/binary-mipsel/olvwm_4.4.3.2p1.4-16woody2_mipsel.deb
stable/main/source/xview_3.2p1.4-16woody2.diff.gz
stable/main/binary-mipsel/xview-clients_3.2p1.4-16woody2_mipsel.deb
stable/main/binary-mipsel/xview-examples_3.2p1.4-16woody2_mipsel.deb
stable/main/binary-mipsel/olwm_3.2p1.4-16woody2_mipsel.deb
stable/main/binary-mipsel/xviewg-dev_3.2p1.4-16woody2_mipsel.deb
stable/main/binary-mipsel/xviewg_3.2p1.4-16woody2_mipsel.deb
xview (3.2p1.4-16woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [lib/libxview/base/xv_parse.c, CAN-2005-0076]


stable/main/binary-sparc/xtrlock_2.0-6woody2_sparc.deb
xtrlock (2.0-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c,
    CAN-2005-0079]
  * Added build dependencies


stable/main/binary-s390/xtrlock_2.0-6woody2_s390.deb
xtrlock (2.0-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c,
    CAN-2005-0079]
  * Added build dependencies


stable/main/binary-powerpc/xtrlock_2.0-6woody2_powerpc.deb
xtrlock (2.0-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c,
    CAN-2005-0079]
  * Added build dependencies


stable/main/binary-mips/xtrlock_2.0-6woody2_mips.deb
xtrlock (2.0-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c,
    CAN-2005-0079]
  * Added build dependencies


stable/main/binary-m68k/xtrlock_2.0-6woody2_m68k.deb
xtrlock (2.0-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c,
    CAN-2005-0079]
  * Added build dependencies


stable/main/binary-ia64/xtrlock_2.0-6woody2_ia64.deb
xtrlock (2.0-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c,
    CAN-2005-0079]
  * Added build dependencies


stable/main/binary-i386/xtrlock_2.0-6woody2_i386.deb
xtrlock (2.0-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c,
    CAN-2005-0079]
  * Added build dependencies


stable/main/binary-hppa/xtrlock_2.0-6woody2_hppa.deb
xtrlock (2.0-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c,
    CAN-2005-0079]
  * Added build dependencies


stable/main/binary-arm/xtrlock_2.0-6woody2_arm.deb
xtrlock (2.0-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c,
    CAN-2005-0079]
  * Added build dependencies


stable/main/binary-alpha/xtrlock_2.0-6woody2_alpha.deb
xtrlock (2.0-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c,
    CAN-2005-0079]
  * Added build dependencies


stable/main/binary-mipsel/xtrlock_2.0-6woody2_mipsel.deb
stable/main/source/xtrlock_2.0-6woody2.dsc
stable/main/source/xtrlock_2.0-6woody2.tar.gz
xtrlock (2.0-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Justin Pryzby to fix integer overflow [xtrlock.c,
    CAN-2005-0079]
  * Added build dependencies


stable/main/binary-sparc/xpdf-utils_1.00-3.4_sparc.deb
stable/main/binary-sparc/xpdf-reader_1.00-3.4_sparc.deb
xpdf (1.00-3.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [src/Decrypt.cc, CAN-2005-0064]


stable/main/binary-s390/xpdf-utils_1.00-3.4_s390.deb
stable/main/binary-s390/xpdf-reader_1.00-3.4_s390.deb
xpdf (1.00-3.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [src/Decrypt.cc, CAN-2005-0064]


stable/main/binary-powerpc/xpdf-utils_1.00-3.4_powerpc.deb
stable/main/binary-powerpc/xpdf-reader_1.00-3.4_powerpc.deb
xpdf (1.00-3.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [src/Decrypt.cc, CAN-2005-0064]


stable/main/binary-mips/xpdf-utils_1.00-3.4_mips.deb
stable/main/binary-mips/xpdf-reader_1.00-3.4_mips.deb
xpdf (1.00-3.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [src/Decrypt.cc, CAN-2005-0064]


stable/main/binary-m68k/xpdf-reader_1.00-3.4_m68k.deb
stable/main/binary-m68k/xpdf-utils_1.00-3.4_m68k.deb
xpdf (1.00-3.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [src/Decrypt.cc, CAN-2005-0064]


stable/main/binary-ia64/xpdf-reader_1.00-3.4_ia64.deb
stable/main/binary-ia64/xpdf-utils_1.00-3.4_ia64.deb
xpdf (1.00-3.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [src/Decrypt.cc, CAN-2005-0064]


stable/main/binary-i386/xpdf-reader_1.00-3.4_i386.deb
stable/main/binary-i386/xpdf-utils_1.00-3.4_i386.deb
xpdf (1.00-3.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [src/Decrypt.cc, CAN-2005-0064]


stable/main/binary-hppa/xpdf-utils_1.00-3.4_hppa.deb
stable/main/binary-hppa/xpdf-reader_1.00-3.4_hppa.deb
xpdf (1.00-3.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [src/Decrypt.cc, CAN-2005-0064]


stable/main/binary-arm/xpdf-reader_1.00-3.4_arm.deb
stable/main/binary-arm/xpdf-utils_1.00-3.4_arm.deb
xpdf (1.00-3.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [src/Decrypt.cc, CAN-2005-0064]


stable/main/binary-alpha/xpdf-reader_1.00-3.4_alpha.deb
stable/main/binary-alpha/xpdf-utils_1.00-3.4_alpha.deb
xpdf (1.00-3.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [src/Decrypt.cc, CAN-2005-0064]


stable/main/binary-all/xpdf_1.00-3.4_all.deb
stable/main/binary-all/xpdf-common_1.00-3.4_all.deb
stable/main/source/xpdf_1.00-3.4.dsc
stable/main/source/xpdf_1.00-3.4.diff.gz
stable/main/binary-mipsel/xpdf-reader_1.00-3.4_mipsel.deb
stable/main/binary-mipsel/xpdf-utils_1.00-3.4_mipsel.deb
xpdf (1.00-3.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [src/Decrypt.cc, CAN-2005-0064]


stable/main/binary-sparc/xpcd_2.08-8woody3_sparc.deb
stable/main/binary-sparc/xpcd-gimp_2.08-8woody3_sparc.deb
xpcd (2.08-8woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [test/view.c, test/plug-0.54.c,
    xpcd/complete.c, CAN-2005-0074]


stable/main/binary-s390/xpcd_2.08-8woody3_s390.deb
stable/main/binary-s390/xpcd-gimp_2.08-8woody3_s390.deb
xpcd (2.08-8woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [test/view.c, test/plug-0.54.c,
    xpcd/complete.c, CAN-2005-0074]


stable/main/binary-powerpc/xpcd_2.08-8woody3_powerpc.deb
stable/main/binary-powerpc/xpcd-gimp_2.08-8woody3_powerpc.deb
xpcd (2.08-8woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [test/view.c, test/plug-0.54.c,
    xpcd/complete.c, CAN-2005-0074]


stable/main/binary-mips/xpcd_2.08-8woody3_mips.deb
stable/main/binary-mips/xpcd-gimp_2.08-8woody3_mips.deb
xpcd (2.08-8woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [test/view.c, test/plug-0.54.c,
    xpcd/complete.c, CAN-2005-0074]


stable/main/binary-m68k/xpcd-gimp_2.08-8woody3_m68k.deb
stable/main/binary-m68k/xpcd_2.08-8woody3_m68k.deb
xpcd (2.08-8woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [test/view.c, test/plug-0.54.c,
    xpcd/complete.c, CAN-2005-0074]


stable/main/binary-ia64/xpcd-gimp_2.08-8woody3_ia64.deb
stable/main/binary-ia64/xpcd_2.08-8woody3_ia64.deb
xpcd (2.08-8woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [test/view.c, test/plug-0.54.c,
    xpcd/complete.c, CAN-2005-0074]


stable/main/binary-i386/xpcd-gimp_2.08-8woody3_i386.deb
stable/main/binary-i386/xpcd_2.08-8woody3_i386.deb
stable/main/binary-i386/xpcd-svga_2.08-8woody3_i386.deb
xpcd (2.08-8woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [test/view.c, test/plug-0.54.c,
    xpcd/complete.c, CAN-2005-0074]


stable/main/binary-hppa/xpcd_2.08-8woody3_hppa.deb
stable/main/binary-hppa/xpcd-gimp_2.08-8woody3_hppa.deb
xpcd (2.08-8woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [test/view.c, test/plug-0.54.c,
    xpcd/complete.c, CAN-2005-0074]


stable/main/binary-arm/xpcd-gimp_2.08-8woody3_arm.deb
stable/main/binary-arm/xpcd_2.08-8woody3_arm.deb
xpcd (2.08-8woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [test/view.c, test/plug-0.54.c,
    xpcd/complete.c, CAN-2005-0074]


stable/main/binary-alpha/xpcd-gimp_2.08-8woody3_alpha.deb
stable/main/binary-alpha/xpcd_2.08-8woody3_alpha.deb
xpcd (2.08-8woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [test/view.c, test/plug-0.54.c,
    xpcd/complete.c, CAN-2005-0074]


stable/main/binary-mipsel/xpcd-gimp_2.08-8woody3_mipsel.deb
stable/main/binary-mipsel/xpcd_2.08-8woody3_mipsel.deb
stable/main/source/xpcd_2.08-8woody3.diff.gz
stable/main/source/xpcd_2.08-8woody3.dsc
xpcd (2.08-8woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflows [test/view.c, test/plug-0.54.c,
    xpcd/complete.c, CAN-2005-0074]


stable/main/binary-sparc/xloadimage_4.1-10woody1_sparc.deb
xloadimage (4.1-10woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch from xli to fix integer overflows [new.c,
    CAN-2005-0639]
  * Backported patch from xli upstream to add quoting protection to
    filenames when uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-s390/xloadimage_4.1-10woody1_s390.deb
xloadimage (4.1-10woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch from xli to fix integer overflows [new.c,
    CAN-2005-0639]
  * Backported patch from xli upstream to add quoting protection to
    filenames when uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-powerpc/xloadimage_4.1-10woody1_powerpc.deb
xloadimage (4.1-10woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch from xli to fix integer overflows [new.c,
    CAN-2005-0639]
  * Backported patch from xli upstream to add quoting protection to
    filenames when uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-mipsel/xloadimage_4.1-10woody1_mipsel.deb
xloadimage (4.1-10woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch from xli to fix integer overflows [new.c,
    CAN-2005-0639]
  * Backported patch from xli upstream to add quoting protection to
    filenames when uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-mips/xloadimage_4.1-10woody1_mips.deb
xloadimage (4.1-10woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch from xli to fix integer overflows [new.c,
    CAN-2005-0639]
  * Backported patch from xli upstream to add quoting protection to
    filenames when uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-m68k/xloadimage_4.1-10woody1_m68k.deb
xloadimage (4.1-10woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch from xli to fix integer overflows [new.c,
    CAN-2005-0639]
  * Backported patch from xli upstream to add quoting protection to
    filenames when uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-ia64/xloadimage_4.1-10woody1_ia64.deb
xloadimage (4.1-10woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch from xli to fix integer overflows [new.c,
    CAN-2005-0639]
  * Backported patch from xli upstream to add quoting protection to
    filenames when uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-i386/xloadimage_4.1-10woody1_i386.deb
xloadimage (4.1-10woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch from xli to fix integer overflows [new.c,
    CAN-2005-0639]
  * Backported patch from xli upstream to add quoting protection to
    filenames when uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-hppa/xloadimage_4.1-10woody1_hppa.deb
xloadimage (4.1-10woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch from xli to fix integer overflows [new.c,
    CAN-2005-0639]
  * Backported patch from xli upstream to add quoting protection to
    filenames when uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-alpha/xloadimage_4.1-10woody1_alpha.deb
xloadimage (4.1-10woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch from xli to fix integer overflows [new.c,
    CAN-2005-0639]
  * Backported patch from xli upstream to add quoting protection to
    filenames when uncompressing files [zio.c, CAN-2005-0638]


stable/main/source/xloadimage_4.1-10woody1.dsc
stable/main/binary-arm/xloadimage_4.1-10woody1_arm.deb
stable/main/source/xloadimage_4.1-10woody1.diff.gz
xloadimage (4.1-10woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch from xli to fix integer overflows [new.c,
    CAN-2005-0639]
  * Backported patch from xli upstream to add quoting protection to
    filenames when uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-sparc/xli_1.17.0-11woody1_sparc.deb
xli (1.17.0-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from DSA 069 to fix buffer overflow in faces decoder
    [faces.c, CAN-2001-0775]
  * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639]
  * Backported upstream patch to add quoting protection to filenames when
    uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-s390/xli_1.17.0-11woody1_s390.deb
xli (1.17.0-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from DSA 069 to fix buffer overflow in faces decoder
    [faces.c, CAN-2001-0775]
  * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639]
  * Backported upstream patch to add quoting protection to filenames when
    uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-powerpc/xli_1.17.0-11woody1_powerpc.deb
xli (1.17.0-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from DSA 069 to fix buffer overflow in faces decoder
    [faces.c, CAN-2001-0775]
  * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639]
  * Backported upstream patch to add quoting protection to filenames when
    uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-mipsel/xli_1.17.0-11woody1_mipsel.deb
xli (1.17.0-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from DSA 069 to fix buffer overflow in faces decoder
    [faces.c, CAN-2001-0775]
  * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639]
  * Backported upstream patch to add quoting protection to filenames when
    uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-mips/xli_1.17.0-11woody1_mips.deb
xli (1.17.0-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from DSA 069 to fix buffer overflow in faces decoder
    [faces.c, CAN-2001-0775]
  * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639]
  * Backported upstream patch to add quoting protection to filenames when
    uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-m68k/xli_1.17.0-11woody1_m68k.deb
xli (1.17.0-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from DSA 069 to fix buffer overflow in faces decoder
    [faces.c, CAN-2001-0775]
  * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639]
  * Backported upstream patch to add quoting protection to filenames when
    uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-ia64/xli_1.17.0-11woody1_ia64.deb
xli (1.17.0-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from DSA 069 to fix buffer overflow in faces decoder
    [faces.c, CAN-2001-0775]
  * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639]
  * Backported upstream patch to add quoting protection to filenames when
    uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-i386/xli_1.17.0-11woody1_i386.deb
xli (1.17.0-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from DSA 069 to fix buffer overflow in faces decoder
    [faces.c, CAN-2001-0775]
  * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639]
  * Backported upstream patch to add quoting protection to filenames when
    uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-hppa/xli_1.17.0-11woody1_hppa.deb
xli (1.17.0-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from DSA 069 to fix buffer overflow in faces decoder
    [faces.c, CAN-2001-0775]
  * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639]
  * Backported upstream patch to add quoting protection to filenames when
    uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-alpha/xli_1.17.0-11woody1_alpha.deb
xli (1.17.0-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from DSA 069 to fix buffer overflow in faces decoder
    [faces.c, CAN-2001-0775]
  * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639]
  * Backported upstream patch to add quoting protection to filenames when
    uncompressing files [zio.c, CAN-2005-0638]


stable/main/source/xli_1.17.0-11woody1.diff.gz
stable/main/source/xli_1.17.0-11woody1.dsc
stable/main/binary-arm/xli_1.17.0-11woody1_arm.deb
xli (1.17.0-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from DSA 069 to fix buffer overflow in faces decoder
    [faces.c, CAN-2001-0775]
  * Applied upstream patch to fix integer overflows [new.c, CAN-2005-0639]
  * Backported upstream patch to add quoting protection to filenames when
    uncompressing files [zio.c, CAN-2005-0638]


stable/main/binary-sparc/libxine0_0.9.8-2woody3_sparc.deb
stable/main/binary-sparc/libxine-dev_0.9.8-2woody3_sparc.deb
xine-lib (0.9.8-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-s390/libxine0_0.9.8-2woody3_s390.deb
stable/main/binary-s390/libxine-dev_0.9.8-2woody3_s390.deb
xine-lib (0.9.8-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-powerpc/libxine0_0.9.8-2woody3_powerpc.deb
stable/main/binary-powerpc/libxine-dev_0.9.8-2woody3_powerpc.deb
xine-lib (0.9.8-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mipsel/libxine-dev_0.9.8-2woody3_mipsel.deb
stable/main/binary-mipsel/libxine0_0.9.8-2woody3_mipsel.deb
xine-lib (0.9.8-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mips/libxine0_0.9.8-2woody3_mips.deb
stable/main/binary-mips/libxine-dev_0.9.8-2woody3_mips.deb
xine-lib (0.9.8-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-m68k/libxine-dev_0.9.8-2woody3_m68k.deb
stable/main/binary-m68k/libxine0_0.9.8-2woody3_m68k.deb
xine-lib (0.9.8-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-ia64/libxine-dev_0.9.8-2woody3_ia64.deb
stable/main/binary-ia64/libxine0_0.9.8-2woody3_ia64.deb
xine-lib (0.9.8-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-hppa/libxine0_0.9.8-2woody3_hppa.deb
stable/main/binary-hppa/libxine-dev_0.9.8-2woody3_hppa.deb
xine-lib (0.9.8-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-arm/libxine-dev_0.9.8-2woody3_arm.deb
stable/main/binary-arm/libxine0_0.9.8-2woody3_arm.deb
xine-lib (0.9.8-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-alpha/libxine-dev_0.9.8-2woody3_alpha.deb
stable/main/binary-alpha/libxine0_0.9.8-2woody3_alpha.deb
xine-lib (0.9.8-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-i386/libxine0_0.9.8-2woody3_i386.deb
stable/main/binary-i386/libxine-dev_0.9.8-2woody3_i386.deb
stable/main/source/xine-lib_0.9.8-2woody3.diff.gz
stable/main/source/xine-lib_0.9.8-2woody3.dsc
xine-lib (0.9.8-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-sparc/xemacs21-bin_21.4.6-8woody2_sparc.deb
stable/main/binary-sparc/xemacs21-mule-canna-wnn_21.4.6-8woody2_sparc.deb
stable/main/binary-sparc/xemacs21-mule_21.4.6-8woody2_sparc.deb
stable/main/binary-sparc/xemacs21-gnome-mule-canna-wnn_21.4.6-8woody2_sparc.deb
stable/main/binary-sparc/xemacs21-gnome-nomule_21.4.6-8woody2_sparc.deb
stable/main/binary-sparc/xemacs21-nomule_21.4.6-8woody2_sparc.deb
stable/main/binary-sparc/xemacs21-gnome-mule_21.4.6-8woody2_sparc.deb
xemacs21 (21.4.6-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-s390/xemacs21-nomule_21.4.6-8woody2_s390.deb
stable/main/binary-s390/xemacs21-gnome-mule_21.4.6-8woody2_s390.deb
stable/main/binary-s390/xemacs21-mule-canna-wnn_21.4.6-8woody2_s390.deb
stable/main/binary-s390/xemacs21-gnome-mule-canna-wnn_21.4.6-8woody2_s390.deb
stable/main/binary-s390/xemacs21-bin_21.4.6-8woody2_s390.deb
stable/main/binary-s390/xemacs21-mule_21.4.6-8woody2_s390.deb
stable/main/binary-s390/xemacs21-gnome-nomule_21.4.6-8woody2_s390.deb
xemacs21 (21.4.6-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-powerpc/xemacs21-bin_21.4.6-8woody2_powerpc.deb
stable/main/binary-powerpc/xemacs21-gnome-nomule_21.4.6-8woody2_powerpc.deb
stable/main/binary-powerpc/xemacs21-gnome-mule-canna-wnn_21.4.6-8woody2_powerpc.deb
stable/main/binary-powerpc/xemacs21-gnome-mule_21.4.6-8woody2_powerpc.deb
stable/main/binary-powerpc/xemacs21-mule-canna-wnn_21.4.6-8woody2_powerpc.deb
stable/main/binary-powerpc/xemacs21-mule_21.4.6-8woody2_powerpc.deb
stable/main/binary-powerpc/xemacs21-nomule_21.4.6-8woody2_powerpc.deb
xemacs21 (21.4.6-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-mipsel/xemacs21-nomule_21.4.6-8woody2_mipsel.deb
stable/main/binary-mipsel/xemacs21-bin_21.4.6-8woody2_mipsel.deb
stable/main/binary-mipsel/xemacs21-gnome-mule-canna-wnn_21.4.6-8woody2_mipsel.deb
stable/main/binary-mipsel/xemacs21-mule-canna-wnn_21.4.6-8woody2_mipsel.deb
stable/main/binary-mipsel/xemacs21-gnome-mule_21.4.6-8woody2_mipsel.deb
stable/main/binary-mipsel/xemacs21-mule_21.4.6-8woody2_mipsel.deb
stable/main/binary-mipsel/xemacs21-gnome-nomule_21.4.6-8woody2_mipsel.deb
xemacs21 (21.4.6-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-mips/xemacs21-bin_21.4.6-8woody2_mips.deb
stable/main/binary-mips/xemacs21-mule-canna-wnn_21.4.6-8woody2_mips.deb
stable/main/binary-mips/xemacs21-gnome-mule_21.4.6-8woody2_mips.deb
stable/main/binary-mips/xemacs21-mule_21.4.6-8woody2_mips.deb
stable/main/binary-mips/xemacs21-gnome-nomule_21.4.6-8woody2_mips.deb
stable/main/binary-mips/xemacs21-gnome-mule-canna-wnn_21.4.6-8woody2_mips.deb
stable/main/binary-mips/xemacs21-nomule_21.4.6-8woody2_mips.deb
xemacs21 (21.4.6-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-i386/xemacs21-mule-canna-wnn_21.4.6-8woody2_i386.deb
stable/main/binary-i386/xemacs21-gnome-mule-canna-wnn_21.4.6-8woody2_i386.deb
stable/main/binary-i386/xemacs21-gnome-mule_21.4.6-8woody2_i386.deb
stable/main/binary-i386/xemacs21-bin_21.4.6-8woody2_i386.deb
stable/main/binary-i386/xemacs21-nomule_21.4.6-8woody2_i386.deb
stable/main/binary-i386/xemacs21-gnome-nomule_21.4.6-8woody2_i386.deb
stable/main/binary-i386/xemacs21-mule_21.4.6-8woody2_i386.deb
xemacs21 (21.4.6-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-arm/xemacs21-mule_21.4.6-8woody2_arm.deb
stable/main/binary-arm/xemacs21-bin_21.4.6-8woody2_arm.deb
stable/main/binary-arm/xemacs21-gnome-nomule_21.4.6-8woody2_arm.deb
stable/main/binary-arm/xemacs21-gnome-mule_21.4.6-8woody2_arm.deb
stable/main/binary-arm/xemacs21-mule-canna-wnn_21.4.6-8woody2_arm.deb
stable/main/binary-arm/xemacs21-nomule_21.4.6-8woody2_arm.deb
stable/main/binary-arm/xemacs21-gnome-mule-canna-wnn_21.4.6-8woody2_arm.deb
xemacs21 (21.4.6-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-alpha/xemacs21-nomule_21.4.6-8woody2_alpha.deb
stable/main/binary-alpha/xemacs21-gnome-nomule_21.4.6-8woody2_alpha.deb
stable/main/binary-alpha/xemacs21-bin_21.4.6-8woody2_alpha.deb
stable/main/binary-alpha/xemacs21-gnome-mule-canna-wnn_21.4.6-8woody2_alpha.deb
stable/main/binary-alpha/xemacs21-mule-canna-wnn_21.4.6-8woody2_alpha.deb
stable/main/binary-alpha/xemacs21-gnome-mule_21.4.6-8woody2_alpha.deb
stable/main/binary-alpha/xemacs21-mule_21.4.6-8woody2_alpha.deb
xemacs21 (21.4.6-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/source/xemacs21_21.4.6-8woody2.dsc
stable/main/binary-all/xemacs21_21.4.6-8woody2_all.deb
stable/main/binary-ia64/xemacs21-gnome-mule-canna-wnn_21.4.6-8woody2_ia64.deb
stable/main/source/xemacs21_21.4.6-8woody2.diff.gz
stable/main/binary-all/xemacs21-supportel_21.4.6-8woody2_all.deb
stable/main/binary-ia64/xemacs21-gnome-nomule_21.4.6-8woody2_ia64.deb
stable/main/binary-ia64/xemacs21-gnome-mule_21.4.6-8woody2_ia64.deb
stable/main/binary-all/xemacs21-support_21.4.6-8woody2_all.deb
stable/main/binary-ia64/xemacs21-mule-canna-wnn_21.4.6-8woody2_ia64.deb
stable/main/binary-ia64/xemacs21-mule_21.4.6-8woody2_ia64.deb
stable/main/binary-ia64/xemacs21-nomule_21.4.6-8woody2_ia64.deb
stable/main/binary-ia64/xemacs21-bin_21.4.6-8woody2_ia64.deb
xemacs21 (21.4.6-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-sparc/wu-ftpd_2.6.2-3woody5_sparc.deb
wu-ftpd (2.6.2-3woody5) stable-security; urgency=high
  * Applied patch by Chris Butler to fix denial of service in the NLST
    command [src/ftpd.c, CAN-2005-0256]
  * Applied and adjusted patch by Chris Butler to fix denial of service in
    the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854]


stable/main/binary-s390/wu-ftpd_2.6.2-3woody5_s390.deb
wu-ftpd (2.6.2-3woody5) stable-security; urgency=high
  * Applied patch by Chris Butler to fix denial of service in the NLST
    command [src/ftpd.c, CAN-2005-0256]
  * Applied and adjusted patch by Chris Butler to fix denial of service in
    the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854]


stable/main/binary-powerpc/wu-ftpd_2.6.2-3woody5_powerpc.deb
wu-ftpd (2.6.2-3woody5) stable-security; urgency=high
  * Applied patch by Chris Butler to fix denial of service in the NLST
    command [src/ftpd.c, CAN-2005-0256]
  * Applied and adjusted patch by Chris Butler to fix denial of service in
    the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854]


stable/main/binary-mipsel/wu-ftpd_2.6.2-3woody5_mipsel.deb
wu-ftpd (2.6.2-3woody5) stable-security; urgency=high
  * Applied patch by Chris Butler to fix denial of service in the NLST
    command [src/ftpd.c, CAN-2005-0256]
  * Applied and adjusted patch by Chris Butler to fix denial of service in
    the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854]


stable/main/binary-mips/wu-ftpd_2.6.2-3woody5_mips.deb
wu-ftpd (2.6.2-3woody5) stable-security; urgency=high
  * Applied patch by Chris Butler to fix denial of service in the NLST
    command [src/ftpd.c, CAN-2005-0256]
  * Applied and adjusted patch by Chris Butler to fix denial of service in
    the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854]


stable/main/binary-m68k/wu-ftpd_2.6.2-3woody5_m68k.deb
wu-ftpd (2.6.2-3woody5) stable-security; urgency=high
  * Applied patch by Chris Butler to fix denial of service in the NLST
    command [src/ftpd.c, CAN-2005-0256]
  * Applied and adjusted patch by Chris Butler to fix denial of service in
    the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854]


stable/main/binary-ia64/wu-ftpd_2.6.2-3woody5_ia64.deb
wu-ftpd (2.6.2-3woody5) stable-security; urgency=high
  * Applied patch by Chris Butler to fix denial of service in the NLST
    command [src/ftpd.c, CAN-2005-0256]
  * Applied and adjusted patch by Chris Butler to fix denial of service in
    the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854]


stable/main/binary-i386/wu-ftpd_2.6.2-3woody5_i386.deb
wu-ftpd (2.6.2-3woody5) stable-security; urgency=high
  * Applied patch by Chris Butler to fix denial of service in the NLST
    command [src/ftpd.c, CAN-2005-0256]
  * Applied and adjusted patch by Chris Butler to fix denial of service in
    the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854]


stable/main/binary-hppa/wu-ftpd_2.6.2-3woody5_hppa.deb
wu-ftpd (2.6.2-3woody5) stable-security; urgency=high
  * Applied patch by Chris Butler to fix denial of service in the NLST
    command [src/ftpd.c, CAN-2005-0256]
  * Applied and adjusted patch by Chris Butler to fix denial of service in
    the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854]


stable/main/binary-alpha/wu-ftpd_2.6.2-3woody5_alpha.deb
wu-ftpd (2.6.2-3woody5) stable-security; urgency=high
  * Applied patch by Chris Butler to fix denial of service in the NLST
    command [src/ftpd.c, CAN-2005-0256]
  * Applied and adjusted patch by Chris Butler to fix denial of service in
    the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854]


stable/main/binary-all/wu-ftpd-academ_2.6.2-3woody5_all.deb
stable/main/source/wu-ftpd_2.6.2-3woody5.dsc
stable/main/source/wu-ftpd_2.6.2-3woody5.diff.gz
stable/main/binary-arm/wu-ftpd_2.6.2-3woody5_arm.deb
wu-ftpd (2.6.2-3woody5) stable-security; urgency=high
  * Applied patch by Chris Butler to fix denial of service in the NLST
    command [src/ftpd.c, CAN-2005-0256]
  * Applied and adjusted patch by Chris Butler to fix denial of service in
    the LIST command [src/ftpcmd.y, src/proto.h, CAN-2003-0854]


stable/main/binary-sparc/libwings-dev_0.80.0-4.2_sparc.deb
stable/main/binary-sparc/libwraster2-dev_0.80.0-4.2_sparc.deb
stable/main/binary-sparc/libwraster2_0.80.0-4.2_sparc.deb
stable/main/binary-sparc/wmaker_0.80.0-4.2_sparc.deb
stable/main/binary-sparc/libwmaker0-dev_0.80.0-4.2_sparc.deb
wmaker (0.80.0-4.2) stable-security; urgency=medium
  * Non-maintainer upload by the Stale Release Manager
  * Bump the version number so that the security update can make its way
    into Debian stable.


stable/main/binary-s390/libwraster2_0.80.0-4.2_s390.deb
stable/main/binary-s390/libwings-dev_0.80.0-4.2_s390.deb
stable/main/binary-s390/libwraster2-dev_0.80.0-4.2_s390.deb
stable/main/binary-s390/wmaker_0.80.0-4.2_s390.deb
stable/main/binary-s390/libwmaker0-dev_0.80.0-4.2_s390.deb
wmaker (0.80.0-4.2) stable-security; urgency=medium
  * Non-maintainer upload by the Stale Release Manager
  * Bump the version number so that the security update can make its way
    into Debian stable.


stable/main/binary-powerpc/libwraster2-dev_0.80.0-4.2_powerpc.deb
stable/main/binary-powerpc/libwings-dev_0.80.0-4.2_powerpc.deb
stable/main/binary-powerpc/libwmaker0-dev_0.80.0-4.2_powerpc.deb
stable/main/binary-powerpc/wmaker_0.80.0-4.2_powerpc.deb
stable/main/binary-powerpc/libwraster2_0.80.0-4.2_powerpc.deb
wmaker (0.80.0-4.2) stable-security; urgency=medium
  * Non-maintainer upload by the Stale Release Manager
  * Bump the version number so that the security update can make its way
    into Debian stable.


stable/main/binary-mips/libwraster2-dev_0.80.0-4.2_mips.deb
stable/main/binary-mips/wmaker_0.80.0-4.2_mips.deb
stable/main/binary-mips/libwraster2_0.80.0-4.2_mips.deb
stable/main/binary-mips/libwmaker0-dev_0.80.0-4.2_mips.deb
stable/main/binary-mips/libwings-dev_0.80.0-4.2_mips.deb
wmaker (0.80.0-4.2) stable-security; urgency=medium
  * Non-maintainer upload by the Stale Release Manager
  * Bump the version number so that the security update can make its way
    into Debian stable.


stable/main/binary-m68k/libwraster2_0.80.0-4.2_m68k.deb
stable/main/binary-m68k/wmaker_0.80.0-4.2_m68k.deb
stable/main/binary-m68k/libwraster2-dev_0.80.0-4.2_m68k.deb
stable/main/binary-m68k/libwings-dev_0.80.0-4.2_m68k.deb
stable/main/binary-m68k/libwmaker0-dev_0.80.0-4.2_m68k.deb
wmaker (0.80.0-4.2) stable-security; urgency=medium
  * Non-maintainer upload by the Stale Release Manager
  * Bump the version number so that the security update can make its way
    into Debian stable.


stable/main/binary-ia64/wmaker_0.80.0-4.2_ia64.deb
stable/main/binary-ia64/libwraster2-dev_0.80.0-4.2_ia64.deb
stable/main/binary-ia64/libwraster2_0.80.0-4.2_ia64.deb
stable/main/binary-ia64/libwings-dev_0.80.0-4.2_ia64.deb
stable/main/binary-ia64/libwmaker0-dev_0.80.0-4.2_ia64.deb
wmaker (0.80.0-4.2) stable-security; urgency=medium
  * Non-maintainer upload by the Stale Release Manager
  * Bump the version number so that the security update can make its way
    into Debian stable.


stable/main/binary-i386/libwings-dev_0.80.0-4.2_i386.deb
stable/main/binary-i386/libwmaker0-dev_0.80.0-4.2_i386.deb
stable/main/binary-i386/libwraster2_0.80.0-4.2_i386.deb
stable/main/binary-i386/wmaker_0.80.0-4.2_i386.deb
stable/main/binary-i386/libwraster2-dev_0.80.0-4.2_i386.deb
wmaker (0.80.0-4.2) stable-security; urgency=medium
  * Non-maintainer upload by the Stale Release Manager
  * Bump the version number so that the security update can make its way
    into Debian stable.


stable/main/binary-hppa/libwraster2-dev_0.80.0-4.2_hppa.deb
stable/main/binary-hppa/wmaker_0.80.0-4.2_hppa.deb
stable/main/binary-hppa/libwraster2_0.80.0-4.2_hppa.deb
stable/main/binary-hppa/libwmaker0-dev_0.80.0-4.2_hppa.deb
stable/main/binary-hppa/libwings-dev_0.80.0-4.2_hppa.deb
wmaker (0.80.0-4.2) stable-security; urgency=medium
  * Non-maintainer upload by the Stale Release Manager
  * Bump the version number so that the security update can make its way
    into Debian stable.


stable/main/binary-arm/libwraster2_0.80.0-4.2_arm.deb
stable/main/binary-arm/libwmaker0-dev_0.80.0-4.2_arm.deb
stable/main/binary-arm/wmaker_0.80.0-4.2_arm.deb
stable/main/binary-arm/libwraster2-dev_0.80.0-4.2_arm.deb
stable/main/binary-arm/libwings-dev_0.80.0-4.2_arm.deb
wmaker (0.80.0-4.2) stable-security; urgency=medium
  * Non-maintainer upload by the Stale Release Manager
  * Bump the version number so that the security update can make its way
    into Debian stable.


stable/main/binary-alpha/wmaker_0.80.0-4.2_alpha.deb
stable/main/binary-alpha/libwraster2_0.80.0-4.2_alpha.deb
stable/main/binary-alpha/libwmaker0-dev_0.80.0-4.2_alpha.deb
stable/main/binary-alpha/libwraster2-dev_0.80.0-4.2_alpha.deb
stable/main/binary-alpha/libwings-dev_0.80.0-4.2_alpha.deb
wmaker (0.80.0-4.2) stable-security; urgency=medium
  * Non-maintainer upload by the Stale Release Manager
  * Bump the version number so that the security update can make its way
    into Debian stable.


stable/main/source/wmaker_0.80.0-4.2.dsc
stable/main/source/wmaker_0.80.0-4.2.diff.gz
stable/main/binary-mipsel/wmaker_0.80.0-4.2_mipsel.deb
stable/main/binary-mipsel/libwings-dev_0.80.0-4.2_mipsel.deb
stable/main/binary-mipsel/libwraster2-dev_0.80.0-4.2_mipsel.deb
stable/main/binary-mipsel/libwmaker0-dev_0.80.0-4.2_mipsel.deb
stable/main/binary-mipsel/libwraster2_0.80.0-4.2_mipsel.deb
wmaker (0.80.0-4.2) stable-security; urgency=medium
  * Non-maintainer upload by the Stale Release Manager
  * Bump the version number so that the security update can make its way
    into Debian stable.


stable/main/binary-all/webmin-samba_0.94-7woody4_all.deb
stable/main/binary-all/webmin-postgresql_0.94-7woody4_all.deb
stable/main/binary-all/webmin-heartbeat_0.94-7woody4_all.deb
stable/main/binary-all/webmin-sshd_0.94-7woody4_all.deb
stable/main/binary-all/webmin-software_0.94-7woody4_all.deb
stable/main/binary-all/webmin-burner_0.94-7woody4_all.deb
stable/main/binary-all/webmin-nis_0.94-7woody4_all.deb
stable/main/binary-all/webmin-qmailadmin_0.94-7woody4_all.deb
stable/main/binary-all/webmin-xinetd_0.94-7woody4_all.deb
stable/main/binary-all/webmin-stunnel_0.94-7woody4_all.deb
stable/main/binary-all/webmin-sendmail_0.94-7woody4_all.deb
stable/main/binary-all/webmin-raid_0.94-7woody4_all.deb
stable/main/source/webmin_0.94-7woody4.dsc
stable/main/binary-all/webmin-cluster-useradmin_0.94-7woody4_all.deb
stable/main/binary-all/webmin-mysql_0.94-7woody4_all.deb
stable/main/binary-all/webmin-fetchmail_0.94-7woody4_all.deb
stable/main/binary-all/webmin_0.94-7woody4_all.deb
stable/main/binary-all/webmin-status_0.94-7woody4_all.deb
stable/main/binary-all/webmin-mon_0.94-7woody4_all.deb
stable/main/binary-all/webmin-exports_0.94-7woody4_all.deb
stable/main/binary-all/webmin-ppp_0.94-7woody4_all.deb
stable/main/binary-all/webmin-apache_0.94-7woody4_all.deb
stable/main/binary-all/webmin-dhcpd_0.94-7woody4_all.deb
stable/main/binary-all/webmin-cluster-software_0.94-7woody4_all.deb
stable/main/binary-all/webmin-squid_0.94-7woody4_all.deb
stable/main/binary-all/webmin-postfix_0.94-7woody4_all.deb
stable/main/binary-all/webmin-bind8_0.94-7woody4_all.deb
stable/main/binary-all/webmin-cpan_0.94-7woody4_all.deb
stable/main/binary-all/webmin-inetd_0.94-7woody4_all.deb
stable/main/binary-all/webmin-jabber_0.94-7woody4_all.deb
stable/main/binary-i386/webmin-grub_0.94-7woody4_i386.deb
stable/main/binary-all/webmin-ssl_0.94-7woody4_all.deb
stable/main/binary-all/webmin-quota_0.94-7woody4_all.deb
stable/main/binary-all/webmin-wuftpd_0.94-7woody4_all.deb
stable/main/binary-all/webmin-core_0.94-7woody4_all.deb
stable/main/binary-all/webmin-lpadmin_0.94-7woody4_all.deb
stable/main/source/webmin_0.94-7woody4.diff.gz
webmin (0.94-7woody4) stable; urgency=medium
  * Non-maintainer upload by Stable Release Manager
  * Corrected the security update to reuse existing temporary directories
    (closes: Bug#285762, Bug#289464)


stable/main/binary-i386/vdr-kbd_1.0.0-1woody2_i386.deb
stable/main/binary-i386/vdr_1.0.0-1woody2_i386.deb
stable/main/binary-i386/vdr-lirc_1.0.0-1woody2_i386.deb
stable/main/binary-i386/vdr-rcu_1.0.0-1woody2_i386.deb
stable/main/source/vdr_1.0.0-1woody2.dsc
stable/main/binary-i386/vdr-daemon_1.0.0-1woody2_i386.deb
stable/main/source/vdr_1.0.0-1woody2.tar.gz
vdr (1.0.0-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed arbitrary file overwrite vulnerability by switching from fopen()
    to open()+fdreopen() and O_CREAT|O_EXCL
    [debian/patches/security-z50_CAN-2005-0071_fopen, CAN-2005-0071]


stable/non-free/binary-arm/unarj_2.43-3woody1_arm.deb
stable/non-free/binary-ia64/unarj_2.43-3woody1_ia64.deb
stable/non-free/binary-m68k/unarj_2.43-3woody1_m68k.deb
stable/non-free/binary-i386/unarj_2.43-3woody1_i386.deb
stable/non-free/binary-powerpc/unarj_2.43-3woody1_powerpc.deb
stable/non-free/source/unarj_2.43-3woody1.diff.gz
stable/non-free/binary-sparc/unarj_2.43-3woody1_sparc.deb
stable/non-free/source/unarj_2.43-3woody1.dsc
stable/non-free/binary-s390/unarj_2.43-3woody1_s390.deb
stable/non-free/binary-alpha/unarj_2.43-3woody1_alpha.deb
stable/non-free/binary-hppa/unarj_2.43-3woody1_hppa.deb
unarj (2.43-3woody1) stable-security; urgency=high
  * Fix buffer overflow problem in filename handling (CAN-2004-0947). Closes: #281922
  * Fix unchecked path extraction problem (CAN-2004-1027).


stable/main/binary-sparc/typespeed_0.4.1-2.3_sparc.deb
typespeed (0.4.1-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [file.c, CAN-2005-0105]


stable/main/binary-s390/typespeed_0.4.1-2.3_s390.deb
typespeed (0.4.1-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [file.c, CAN-2005-0105]


stable/main/binary-powerpc/typespeed_0.4.1-2.3_powerpc.deb
typespeed (0.4.1-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [file.c, CAN-2005-0105]


stable/main/binary-mips/typespeed_0.4.1-2.3_mips.deb
typespeed (0.4.1-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [file.c, CAN-2005-0105]


stable/main/binary-m68k/typespeed_0.4.1-2.3_m68k.deb
typespeed (0.4.1-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [file.c, CAN-2005-0105]


stable/main/binary-ia64/typespeed_0.4.1-2.3_ia64.deb
typespeed (0.4.1-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [file.c, CAN-2005-0105]


stable/main/binary-i386/typespeed_0.4.1-2.3_i386.deb
typespeed (0.4.1-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [file.c, CAN-2005-0105]


stable/main/binary-hppa/typespeed_0.4.1-2.3_hppa.deb
typespeed (0.4.1-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [file.c, CAN-2005-0105]


stable/main/binary-arm/typespeed_0.4.1-2.3_arm.deb
typespeed (0.4.1-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [file.c, CAN-2005-0105]


stable/main/binary-alpha/typespeed_0.4.1-2.3_alpha.deb
typespeed (0.4.1-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [file.c, CAN-2005-0105]


stable/main/binary-mipsel/typespeed_0.4.1-2.3_mipsel.deb
stable/main/source/typespeed_0.4.1-2.3.dsc
stable/main/source/typespeed_0.4.1-2.3.diff.gz
typespeed (0.4.1-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [file.c, CAN-2005-0105]


stable/main/source/toolchain-source_3.0.4-1woody1.dsc
stable/main/source/toolchain-source_3.0.4-1woody1.tar.gz
stable/main/binary-all/toolchain-source_3.0.4-1woody1_all.deb
toolchain-source (3.0.4-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Moved insecure temporary files into a secure temporary directory
    [bin/tpkg-install-libc, CAN-2005-0159]


stable/main/binary-sparc/libtiff-tools_3.5.5-6.woody5_sparc.deb
stable/main/binary-sparc/libtiff3g_3.5.5-6.woody5_sparc.deb
stable/main/binary-sparc/libtiff3g-dev_3.5.5-6.woody5_sparc.deb
tiff (3.5.5-6.woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dmitry V. Levin to fix a segmentation fault
    [tools/tiffdump.c, CAN-2004-1183]
  * Removed spurious .orig file from the last version.


stable/main/binary-s390/libtiff3g_3.5.5-6.woody5_s390.deb
stable/main/binary-s390/libtiff3g-dev_3.5.5-6.woody5_s390.deb
stable/main/binary-s390/libtiff-tools_3.5.5-6.woody5_s390.deb
tiff (3.5.5-6.woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dmitry V. Levin to fix a segmentation fault
    [tools/tiffdump.c, CAN-2004-1183]
  * Removed spurious .orig file from the last version.


stable/main/binary-powerpc/libtiff-tools_3.5.5-6.woody5_powerpc.deb
stable/main/binary-powerpc/libtiff3g_3.5.5-6.woody5_powerpc.deb
stable/main/binary-powerpc/libtiff3g-dev_3.5.5-6.woody5_powerpc.deb
tiff (3.5.5-6.woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dmitry V. Levin to fix a segmentation fault
    [tools/tiffdump.c, CAN-2004-1183]
  * Removed spurious .orig file from the last version.


stable/main/binary-mips/libtiff-tools_3.5.5-6.woody5_mips.deb
stable/main/binary-mips/libtiff3g-dev_3.5.5-6.woody5_mips.deb
stable/main/binary-mips/libtiff3g_3.5.5-6.woody5_mips.deb
tiff (3.5.5-6.woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dmitry V. Levin to fix a segmentation fault
    [tools/tiffdump.c, CAN-2004-1183]
  * Removed spurious .orig file from the last version.


stable/main/binary-m68k/libtiff3g_3.5.5-6.woody5_m68k.deb
stable/main/binary-m68k/libtiff3g-dev_3.5.5-6.woody5_m68k.deb
stable/main/binary-m68k/libtiff-tools_3.5.5-6.woody5_m68k.deb
tiff (3.5.5-6.woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dmitry V. Levin to fix a segmentation fault
    [tools/tiffdump.c, CAN-2004-1183]
  * Removed spurious .orig file from the last version.


stable/main/binary-ia64/libtiff3g-dev_3.5.5-6.woody5_ia64.deb
stable/main/binary-ia64/libtiff3g_3.5.5-6.woody5_ia64.deb
stable/main/binary-ia64/libtiff-tools_3.5.5-6.woody5_ia64.deb
tiff (3.5.5-6.woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dmitry V. Levin to fix a segmentation fault
    [tools/tiffdump.c, CAN-2004-1183]
  * Removed spurious .orig file from the last version.


stable/main/binary-i386/libtiff3g-dev_3.5.5-6.woody5_i386.deb
stable/main/binary-i386/libtiff-tools_3.5.5-6.woody5_i386.deb
stable/main/binary-i386/libtiff3g_3.5.5-6.woody5_i386.deb
tiff (3.5.5-6.woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dmitry V. Levin to fix a segmentation fault
    [tools/tiffdump.c, CAN-2004-1183]
  * Removed spurious .orig file from the last version.


stable/main/binary-hppa/libtiff3g_3.5.5-6.woody5_hppa.deb
stable/main/binary-hppa/libtiff3g-dev_3.5.5-6.woody5_hppa.deb
stable/main/binary-hppa/libtiff-tools_3.5.5-6.woody5_hppa.deb
tiff (3.5.5-6.woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dmitry V. Levin to fix a segmentation fault
    [tools/tiffdump.c, CAN-2004-1183]
  * Removed spurious .orig file from the last version.


stable/main/binary-arm/libtiff3g_3.5.5-6.woody5_arm.deb
stable/main/binary-arm/libtiff3g-dev_3.5.5-6.woody5_arm.deb
stable/main/binary-arm/libtiff-tools_3.5.5-6.woody5_arm.deb
tiff (3.5.5-6.woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dmitry V. Levin to fix a segmentation fault
    [tools/tiffdump.c, CAN-2004-1183]
  * Removed spurious .orig file from the last version.


stable/main/binary-alpha/libtiff3g-dev_3.5.5-6.woody5_alpha.deb
stable/main/binary-alpha/libtiff3g_3.5.5-6.woody5_alpha.deb
stable/main/binary-alpha/libtiff-tools_3.5.5-6.woody5_alpha.deb
tiff (3.5.5-6.woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dmitry V. Levin to fix a segmentation fault
    [tools/tiffdump.c, CAN-2004-1183]
  * Removed spurious .orig file from the last version.


stable/main/binary-mipsel/libtiff3g-dev_3.5.5-6.woody5_mipsel.deb
stable/main/source/tiff_3.5.5-6.woody5.diff.gz
stable/main/source/tiff_3.5.5-6.woody5.dsc
stable/main/binary-mipsel/libtiff-tools_3.5.5-6.woody5_mipsel.deb
stable/main/binary-mipsel/libtiff3g_3.5.5-6.woody5_mipsel.deb
tiff (3.5.5-6.woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dmitry V. Levin to fix a segmentation fault
    [tools/tiffdump.c, CAN-2004-1183]
  * Removed spurious .orig file from the last version.


stable/main/binary-sparc/synaesthesia_2.1-2.1woody3_sparc.deb
synaesthesia (2.1-2.1woody3) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070]


stable/main/binary-s390/synaesthesia_2.1-2.1woody3_s390.deb
synaesthesia (2.1-2.1woody3) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070]


stable/main/binary-powerpc/synaesthesia_2.1-2.1woody3_powerpc.deb
synaesthesia (2.1-2.1woody3) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070]


stable/main/binary-mips/synaesthesia_2.1-2.1woody3_mips.deb
synaesthesia (2.1-2.1woody3) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070]


stable/main/binary-m68k/synaesthesia_2.1-2.1woody3_m68k.deb
synaesthesia (2.1-2.1woody3) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070]


stable/main/binary-ia64/synaesthesia_2.1-2.1woody3_ia64.deb
synaesthesia (2.1-2.1woody3) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070]


stable/main/binary-i386/synaesthesia_2.1-2.1woody3_i386.deb
synaesthesia (2.1-2.1woody3) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070]


stable/main/binary-hppa/synaesthesia_2.1-2.1woody3_hppa.deb
synaesthesia (2.1-2.1woody3) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070]


stable/main/binary-arm/synaesthesia_2.1-2.1woody3_arm.deb
synaesthesia (2.1-2.1woody3) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070]


stable/main/binary-alpha/synaesthesia_2.1-2.1woody3_alpha.deb
synaesthesia (2.1-2.1woody3) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070]


stable/main/binary-mipsel/synaesthesia_2.1-2.1woody3_mipsel.deb
stable/main/source/synaesthesia_2.1-2.1woody3.dsc
stable/main/source/synaesthesia_2.1-2.1woody3.diff.gz
synaesthesia (2.1-2.1woody3) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fixed more unauthorised file access [main.cc, sound.cc, CAN-2005-0070]


stable/main/binary-sparc/sympa_3.3.3-3woody2_sparc.deb
sympa (3.3.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow [src/queue.c, CAN-2005-0073]


stable/main/binary-s390/sympa_3.3.3-3woody2_s390.deb
sympa (3.3.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow [src/queue.c, CAN-2005-0073]


stable/main/binary-powerpc/sympa_3.3.3-3woody2_powerpc.deb
sympa (3.3.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow [src/queue.c, CAN-2005-0073]


stable/main/binary-mips/sympa_3.3.3-3woody2_mips.deb
sympa (3.3.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow [src/queue.c, CAN-2005-0073]


stable/main/binary-m68k/sympa_3.3.3-3woody2_m68k.deb
sympa (3.3.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow [src/queue.c, CAN-2005-0073]


stable/main/binary-ia64/sympa_3.3.3-3woody2_ia64.deb
sympa (3.3.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow [src/queue.c, CAN-2005-0073]


stable/main/binary-i386/sympa_3.3.3-3woody2_i386.deb
sympa (3.3.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow [src/queue.c, CAN-2005-0073]


stable/main/binary-hppa/sympa_3.3.3-3woody2_hppa.deb
sympa (3.3.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow [src/queue.c, CAN-2005-0073]


stable/main/binary-arm/sympa_3.3.3-3woody2_arm.deb
sympa (3.3.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow [src/queue.c, CAN-2005-0073]


stable/main/binary-alpha/sympa_3.3.3-3woody2_alpha.deb
sympa (3.3.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow [src/queue.c, CAN-2005-0073]


stable/main/source/sympa_3.3.3-3woody2.diff.gz
stable/main/binary-all/wwsympa_3.3.3-3woody2_all.deb
stable/main/source/sympa_3.3.3-3woody2.dsc
stable/main/binary-mipsel/sympa_3.3.3-3woody2_mipsel.deb
sympa (3.3.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow [src/queue.c, CAN-2005-0073]


stable/main/binary-sparc/libsword-dev_1.5.3-3woody2_sparc.deb
stable/main/binary-sparc/libsword-runtime_1.5.3-3woody2_sparc.deb
stable/main/binary-sparc/diatheke_1.5.3-3woody2_sparc.deb
stable/main/binary-sparc/libsword1_1.5.3-3woody2_sparc.deb
sword (1.5.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added shell_escape() function to fix arbitrary command execution
    [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015]
  * Improvements by Ulf Härnhammar
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-s390/diatheke_1.5.3-3woody2_s390.deb
stable/main/binary-s390/libsword1_1.5.3-3woody2_s390.deb
stable/main/binary-s390/libsword-runtime_1.5.3-3woody2_s390.deb
stable/main/binary-s390/libsword-dev_1.5.3-3woody2_s390.deb
sword (1.5.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added shell_escape() function to fix arbitrary command execution
    [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015]
  * Improvements by Ulf Härnhammar
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-powerpc/libsword-runtime_1.5.3-3woody2_powerpc.deb
stable/main/binary-powerpc/libsword-dev_1.5.3-3woody2_powerpc.deb
stable/main/binary-powerpc/diatheke_1.5.3-3woody2_powerpc.deb
stable/main/binary-powerpc/libsword1_1.5.3-3woody2_powerpc.deb
sword (1.5.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added shell_escape() function to fix arbitrary command execution
    [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015]
  * Improvements by Ulf Härnhammar
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mips/libsword-runtime_1.5.3-3woody2_mips.deb
stable/main/binary-mips/libsword1_1.5.3-3woody2_mips.deb
stable/main/binary-mips/diatheke_1.5.3-3woody2_mips.deb
stable/main/binary-mips/libsword-dev_1.5.3-3woody2_mips.deb
sword (1.5.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added shell_escape() function to fix arbitrary command execution
    [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015]
  * Improvements by Ulf Härnhammar
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-m68k/libsword1_1.5.3-3woody2_m68k.deb
stable/main/binary-m68k/libsword-runtime_1.5.3-3woody2_m68k.deb
stable/main/binary-m68k/libsword-dev_1.5.3-3woody2_m68k.deb
stable/main/binary-m68k/diatheke_1.5.3-3woody2_m68k.deb
sword (1.5.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added shell_escape() function to fix arbitrary command execution
    [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015]
  * Improvements by Ulf Härnhammar
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-ia64/libsword1_1.5.3-3woody2_ia64.deb
stable/main/binary-ia64/libsword-runtime_1.5.3-3woody2_ia64.deb
stable/main/binary-ia64/libsword-dev_1.5.3-3woody2_ia64.deb
stable/main/binary-ia64/diatheke_1.5.3-3woody2_ia64.deb
sword (1.5.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added shell_escape() function to fix arbitrary command execution
    [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015]
  * Improvements by Ulf Härnhammar
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-i386/libsword-dev_1.5.3-3woody2_i386.deb
stable/main/binary-i386/diatheke_1.5.3-3woody2_i386.deb
stable/main/binary-i386/libsword1_1.5.3-3woody2_i386.deb
stable/main/binary-i386/libsword-runtime_1.5.3-3woody2_i386.deb
sword (1.5.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added shell_escape() function to fix arbitrary command execution
    [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015]
  * Improvements by Ulf Härnhammar
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-hppa/libsword-runtime_1.5.3-3woody2_hppa.deb
stable/main/binary-hppa/diatheke_1.5.3-3woody2_hppa.deb
stable/main/binary-hppa/libsword1_1.5.3-3woody2_hppa.deb
stable/main/binary-hppa/libsword-dev_1.5.3-3woody2_hppa.deb
sword (1.5.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added shell_escape() function to fix arbitrary command execution
    [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015]
  * Improvements by Ulf Härnhammar
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-arm/libsword1_1.5.3-3woody2_arm.deb
stable/main/binary-arm/diatheke_1.5.3-3woody2_arm.deb
stable/main/binary-arm/libsword-runtime_1.5.3-3woody2_arm.deb
stable/main/binary-arm/libsword-dev_1.5.3-3woody2_arm.deb
sword (1.5.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added shell_escape() function to fix arbitrary command execution
    [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015]
  * Improvements by Ulf Härnhammar
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-alpha/libsword1_1.5.3-3woody2_alpha.deb
stable/main/binary-alpha/diatheke_1.5.3-3woody2_alpha.deb
stable/main/binary-alpha/libsword-dev_1.5.3-3woody2_alpha.deb
stable/main/binary-alpha/libsword-runtime_1.5.3-3woody2_alpha.deb
sword (1.5.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added shell_escape() function to fix arbitrary command execution
    [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015]
  * Improvements by Ulf Härnhammar
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mipsel/libsword1_1.5.3-3woody2_mipsel.deb
stable/main/binary-mipsel/libsword-runtime_1.5.3-3woody2_mipsel.deb
stable/main/source/sword_1.5.3-3woody2.dsc
stable/main/binary-mipsel/diatheke_1.5.3-3woody2_mipsel.deb
stable/main/binary-mipsel/libsword-dev_1.5.3-3woody2_mipsel.deb
stable/main/source/sword_1.5.3-3woody2.diff.gz
sword (1.5.3-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added shell_escape() function to fix arbitrary command execution
    [apps/console/diatheke/cgi/diatheke.pl, CAN-2005-0015]
  * Improvements by Ulf Härnhammar
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-sparc/ssed_3.57a-2woody1_sparc.deb
ssed (3.57a-2woody1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-s390/ssed_3.57a-2woody1_s390.deb
ssed (3.57a-2woody1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-powerpc/ssed_3.57a-2woody1_powerpc.deb
ssed (3.57a-2woody1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mipsel/ssed_3.57a-2woody1_mipsel.deb
ssed (3.57a-2woody1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mips/ssed_3.57a-2woody1_mips.deb
ssed (3.57a-2woody1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-m68k/ssed_3.57a-2woody1_m68k.deb
ssed (3.57a-2woody1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-ia64/ssed_3.57a-2woody1_ia64.deb
ssed (3.57a-2woody1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-i386/ssed_3.57a-2woody1_i386.deb
ssed (3.57a-2woody1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-arm/ssed_3.57a-2woody1_arm.deb
ssed (3.57a-2woody1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-alpha/ssed_3.57a-2woody1_alpha.deb
ssed (3.57a-2woody1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/source/ssed_3.57a-2woody1.diff.gz
stable/main/binary-hppa/ssed_3.57a-2woody1_hppa.deb
stable/main/source/ssed_3.57a-2woody1.dsc
ssed (3.57a-2woody1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-all/squirrelmail_1.2.6-3_all.deb
stable/main/source/squirrelmail_1.2.6-3.dsc
stable/main/source/squirrelmail_1.2.6-3.diff.gz
squirrelmail (1:1.2.6-3) stable-security; urgency=low
  * Correct bug in previous security fix which broke logout_error():
    timed out users did not get a friendly message anymore but a bunch
    of failed-to-include-errors. (Closes: #295836)


stable/main/binary-sparc/squidclient_2.4.6-2woody7_sparc.deb
stable/main/binary-sparc/squid-cgi_2.4.6-2woody7_sparc.deb
stable/main/binary-sparc/squid_2.4.6-2woody7_sparc.deb
squid (2.4.6-2woody7) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for DoS in DNS reply parsing
    o squid-2.5.STABLE8-dns_assert.patch
    o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446


stable/main/binary-s390/squidclient_2.4.6-2woody7_s390.deb
stable/main/binary-s390/squid_2.4.6-2woody7_s390.deb
stable/main/binary-s390/squid-cgi_2.4.6-2woody7_s390.deb
squid (2.4.6-2woody7) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for DoS in DNS reply parsing
    o squid-2.5.STABLE8-dns_assert.patch
    o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446


stable/main/binary-powerpc/squid-cgi_2.4.6-2woody7_powerpc.deb
stable/main/binary-powerpc/squidclient_2.4.6-2woody7_powerpc.deb
stable/main/binary-powerpc/squid_2.4.6-2woody7_powerpc.deb
squid (2.4.6-2woody7) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for DoS in DNS reply parsing
    o squid-2.5.STABLE8-dns_assert.patch
    o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446


stable/main/binary-mips/squid_2.4.6-2woody7_mips.deb
stable/main/binary-mips/squidclient_2.4.6-2woody7_mips.deb
stable/main/binary-mips/squid-cgi_2.4.6-2woody7_mips.deb
squid (2.4.6-2woody7) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for DoS in DNS reply parsing
    o squid-2.5.STABLE8-dns_assert.patch
    o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446


stable/main/binary-m68k/squid_2.4.6-2woody7_m68k.deb
stable/main/binary-m68k/squid-cgi_2.4.6-2woody7_m68k.deb
stable/main/binary-m68k/squidclient_2.4.6-2woody7_m68k.deb
squid (2.4.6-2woody7) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for DoS in DNS reply parsing
    o squid-2.5.STABLE8-dns_assert.patch
    o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446


stable/main/binary-ia64/squid_2.4.6-2woody7_ia64.deb
stable/main/binary-ia64/squidclient_2.4.6-2woody7_ia64.deb
stable/main/binary-ia64/squid-cgi_2.4.6-2woody7_ia64.deb
squid (2.4.6-2woody7) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for DoS in DNS reply parsing
    o squid-2.5.STABLE8-dns_assert.patch
    o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446


stable/main/binary-i386/squid-cgi_2.4.6-2woody7_i386.deb
stable/main/binary-i386/squidclient_2.4.6-2woody7_i386.deb
stable/main/binary-i386/squid_2.4.6-2woody7_i386.deb
squid (2.4.6-2woody7) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for DoS in DNS reply parsing
    o squid-2.5.STABLE8-dns_assert.patch
    o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446


stable/main/binary-hppa/squidclient_2.4.6-2woody7_hppa.deb
stable/main/binary-hppa/squid-cgi_2.4.6-2woody7_hppa.deb
stable/main/binary-hppa/squid_2.4.6-2woody7_hppa.deb
squid (2.4.6-2woody7) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for DoS in DNS reply parsing
    o squid-2.5.STABLE8-dns_assert.patch
    o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446


stable/main/binary-arm/squid_2.4.6-2woody7_arm.deb
stable/main/binary-arm/squidclient_2.4.6-2woody7_arm.deb
stable/main/binary-arm/squid-cgi_2.4.6-2woody7_arm.deb
squid (2.4.6-2woody7) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for DoS in DNS reply parsing
    o squid-2.5.STABLE8-dns_assert.patch
    o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446


stable/main/binary-alpha/squid_2.4.6-2woody7_alpha.deb
stable/main/binary-alpha/squidclient_2.4.6-2woody7_alpha.deb
stable/main/binary-alpha/squid-cgi_2.4.6-2woody7_alpha.deb
squid (2.4.6-2woody7) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for DoS in DNS reply parsing
    o squid-2.5.STABLE8-dns_assert.patch
    o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446


stable/main/binary-mipsel/squid_2.4.6-2woody7_mipsel.deb
stable/main/source/squid_2.4.6-2woody7.diff.gz
stable/main/binary-mipsel/squidclient_2.4.6-2woody7_mipsel.deb
stable/main/binary-mipsel/squid-cgi_2.4.6-2woody7_mipsel.deb
stable/main/source/squid_2.4.6-2woody7.dsc
squid (2.4.6-2woody7) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for DoS in DNS reply parsing
    o squid-2.5.STABLE8-dns_assert.patch
    o src/comm.c, src/fqdncache.c, src/ipcache.c, CAN-2005-0446


stable/main/binary-sparc/slocate_2.6-1.3.3_sparc.deb
slocate (2.6-1.3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103)


stable/main/binary-s390/slocate_2.6-1.3.3_s390.deb
slocate (2.6-1.3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103)


stable/main/binary-powerpc/slocate_2.6-1.3.3_powerpc.deb
slocate (2.6-1.3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103)


stable/main/binary-mips/slocate_2.6-1.3.3_mips.deb
slocate (2.6-1.3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103)


stable/main/binary-m68k/slocate_2.6-1.3.3_m68k.deb
slocate (2.6-1.3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103)


stable/main/binary-ia64/slocate_2.6-1.3.3_ia64.deb
slocate (2.6-1.3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103)


stable/main/binary-i386/slocate_2.6-1.3.3_i386.deb
slocate (2.6-1.3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103)


stable/main/binary-hppa/slocate_2.6-1.3.3_hppa.deb
slocate (2.6-1.3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103)


stable/main/binary-arm/slocate_2.6-1.3.3_arm.deb
slocate (2.6-1.3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103)


stable/main/binary-alpha/slocate_2.6-1.3.3_alpha.deb
slocate (2.6-1.3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103)


stable/main/source/slocate_2.6-1.3.3.dsc
stable/main/binary-mipsel/slocate_2.6-1.3.3_mipsel.deb
stable/main/source/slocate_2.6-1.3.3.diff.gz
slocate (2.6-1.3.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes unprivileged access (DSA 428, CAN-2003-0848, Bug#226103)


stable/main/binary-sparc/remstats-bintools_1.00a4-8woody1_sparc.deb
remstats (1.00a4-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled debug file /tmp/uptimes in order to prevent a symlink attack
    against the server [unix-status-server.pl, CAN-2005-0387]
  * Added test for invalid IP numbers to fix arbitrary command execution
    [remoteping-server.pl, CAN-2005-0388]


stable/main/binary-s390/remstats-bintools_1.00a4-8woody1_s390.deb
remstats (1.00a4-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled debug file /tmp/uptimes in order to prevent a symlink attack
    against the server [unix-status-server.pl, CAN-2005-0387]
  * Added test for invalid IP numbers to fix arbitrary command execution
    [remoteping-server.pl, CAN-2005-0388]


stable/main/binary-powerpc/remstats-bintools_1.00a4-8woody1_powerpc.deb
remstats (1.00a4-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled debug file /tmp/uptimes in order to prevent a symlink attack
    against the server [unix-status-server.pl, CAN-2005-0387]
  * Added test for invalid IP numbers to fix arbitrary command execution
    [remoteping-server.pl, CAN-2005-0388]


stable/main/binary-mipsel/remstats-bintools_1.00a4-8woody1_mipsel.deb
remstats (1.00a4-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled debug file /tmp/uptimes in order to prevent a symlink attack
    against the server [unix-status-server.pl, CAN-2005-0387]
  * Added test for invalid IP numbers to fix arbitrary command execution
    [remoteping-server.pl, CAN-2005-0388]


stable/main/binary-mips/remstats-bintools_1.00a4-8woody1_mips.deb
remstats (1.00a4-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled debug file /tmp/uptimes in order to prevent a symlink attack
    against the server [unix-status-server.pl, CAN-2005-0387]
  * Added test for invalid IP numbers to fix arbitrary command execution
    [remoteping-server.pl, CAN-2005-0388]


stable/main/binary-m68k/remstats-bintools_1.00a4-8woody1_m68k.deb
remstats (1.00a4-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled debug file /tmp/uptimes in order to prevent a symlink attack
    against the server [unix-status-server.pl, CAN-2005-0387]
  * Added test for invalid IP numbers to fix arbitrary command execution
    [remoteping-server.pl, CAN-2005-0388]


stable/main/binary-ia64/remstats-bintools_1.00a4-8woody1_ia64.deb
remstats (1.00a4-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled debug file /tmp/uptimes in order to prevent a symlink attack
    against the server [unix-status-server.pl, CAN-2005-0387]
  * Added test for invalid IP numbers to fix arbitrary command execution
    [remoteping-server.pl, CAN-2005-0388]


stable/main/binary-i386/remstats-bintools_1.00a4-8woody1_i386.deb
remstats (1.00a4-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled debug file /tmp/uptimes in order to prevent a symlink attack
    against the server [unix-status-server.pl, CAN-2005-0387]
  * Added test for invalid IP numbers to fix arbitrary command execution
    [remoteping-server.pl, CAN-2005-0388]


stable/main/binary-hppa/remstats-bintools_1.00a4-8woody1_hppa.deb
remstats (1.00a4-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled debug file /tmp/uptimes in order to prevent a symlink attack
    against the server [unix-status-server.pl, CAN-2005-0387]
  * Added test for invalid IP numbers to fix arbitrary command execution
    [remoteping-server.pl, CAN-2005-0388]


stable/main/binary-alpha/remstats-bintools_1.00a4-8woody1_alpha.deb
remstats (1.00a4-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled debug file /tmp/uptimes in order to prevent a symlink attack
    against the server [unix-status-server.pl, CAN-2005-0387]
  * Added test for invalid IP numbers to fix arbitrary command execution
    [remoteping-server.pl, CAN-2005-0388]


stable/main/binary-all/remstats-doc_1.00a4-8woody1_all.deb
stable/main/binary-all/remstats-servers_1.00a4-8woody1_all.deb
stable/main/source/remstats_1.00a4-8woody1.diff.gz
stable/main/source/remstats_1.00a4-8woody1.dsc
stable/main/binary-arm/remstats-bintools_1.00a4-8woody1_arm.deb
stable/main/binary-all/remstats_1.00a4-8woody1_all.deb
remstats (1.00a4-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled debug file /tmp/uptimes in order to prevent a symlink attack
    against the server [unix-status-server.pl, CAN-2005-0387]
  * Added test for invalid IP numbers to fix arbitrary command execution
    [remoteping-server.pl, CAN-2005-0388]


stable/main/binary-sparc/queue_1.30.1-4woody2_sparc.deb
queue (1.30.1-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by "jaguar" to fix several buffer overflows
    [queue.c, queued.c, CAN-2004-0555]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-s390/queue_1.30.1-4woody2_s390.deb
queue (1.30.1-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by "jaguar" to fix several buffer overflows
    [queue.c, queued.c, CAN-2004-0555]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-powerpc/queue_1.30.1-4woody2_powerpc.deb
queue (1.30.1-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by "jaguar" to fix several buffer overflows
    [queue.c, queued.c, CAN-2004-0555]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mips/queue_1.30.1-4woody2_mips.deb
queue (1.30.1-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by "jaguar" to fix several buffer overflows
    [queue.c, queued.c, CAN-2004-0555]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-m68k/queue_1.30.1-4woody2_m68k.deb
queue (1.30.1-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by "jaguar" to fix several buffer overflows
    [queue.c, queued.c, CAN-2004-0555]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-ia64/queue_1.30.1-4woody2_ia64.deb
queue (1.30.1-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by "jaguar" to fix several buffer overflows
    [queue.c, queued.c, CAN-2004-0555]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-i386/queue_1.30.1-4woody2_i386.deb
queue (1.30.1-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by "jaguar" to fix several buffer overflows
    [queue.c, queued.c, CAN-2004-0555]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-hppa/queue_1.30.1-4woody2_hppa.deb
queue (1.30.1-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by "jaguar" to fix several buffer overflows
    [queue.c, queued.c, CAN-2004-0555]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-arm/queue_1.30.1-4woody2_arm.deb
queue (1.30.1-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by "jaguar" to fix several buffer overflows
    [queue.c, queued.c, CAN-2004-0555]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-alpha/queue_1.30.1-4woody2_alpha.deb
queue (1.30.1-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by "jaguar" to fix several buffer overflows
    [queue.c, queued.c, CAN-2004-0555]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mipsel/queue_1.30.1-4woody2_mipsel.deb
stable/main/source/queue_1.30.1-4woody2.dsc
stable/main/source/queue_1.30.1-4woody2.diff.gz
queue (1.30.1-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by "jaguar" to fix several buffer overflows
    [queue.c, queued.c, CAN-2004-0555]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-sparc/qpopper_4.0.4-2.woody.4_sparc.deb
stable/main/binary-sparc/qpopper-drac_4.0.4-2.woody.4_sparc.deb
qpopper (4.0.4-2.woody.4) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143)


stable/main/binary-s390/qpopper-drac_4.0.4-2.woody.4_s390.deb
stable/main/binary-s390/qpopper_4.0.4-2.woody.4_s390.deb
qpopper (4.0.4-2.woody.4) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143)


stable/main/binary-powerpc/qpopper_4.0.4-2.woody.4_powerpc.deb
stable/main/binary-powerpc/qpopper-drac_4.0.4-2.woody.4_powerpc.deb
qpopper (4.0.4-2.woody.4) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143)


stable/main/binary-mips/qpopper-drac_4.0.4-2.woody.4_mips.deb
stable/main/binary-mips/qpopper_4.0.4-2.woody.4_mips.deb
qpopper (4.0.4-2.woody.4) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143)


stable/main/binary-m68k/qpopper_4.0.4-2.woody.4_m68k.deb
stable/main/binary-m68k/qpopper-drac_4.0.4-2.woody.4_m68k.deb
qpopper (4.0.4-2.woody.4) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143)


stable/main/binary-ia64/qpopper-drac_4.0.4-2.woody.4_ia64.deb
stable/main/binary-ia64/qpopper_4.0.4-2.woody.4_ia64.deb
qpopper (4.0.4-2.woody.4) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143)


stable/main/binary-i386/qpopper_4.0.4-2.woody.4_i386.deb
stable/main/binary-i386/qpopper-drac_4.0.4-2.woody.4_i386.deb
qpopper (4.0.4-2.woody.4) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143)


stable/main/binary-hppa/qpopper-drac_4.0.4-2.woody.4_hppa.deb
stable/main/binary-hppa/qpopper_4.0.4-2.woody.4_hppa.deb
qpopper (4.0.4-2.woody.4) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143)


stable/main/binary-arm/qpopper-drac_4.0.4-2.woody.4_arm.deb
stable/main/binary-arm/qpopper_4.0.4-2.woody.4_arm.deb
qpopper (4.0.4-2.woody.4) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143)


stable/main/binary-alpha/qpopper-drac_4.0.4-2.woody.4_alpha.deb
stable/main/binary-alpha/qpopper_4.0.4-2.woody.4_alpha.deb
qpopper (4.0.4-2.woody.4) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143)


stable/main/binary-mipsel/qpopper_4.0.4-2.woody.4_mipsel.deb
stable/main/source/qpopper_4.0.4-2.woody.4.dsc
stable/main/binary-mipsel/qpopper-drac_4.0.4-2.woody.4_mipsel.deb
stable/main/source/qpopper_4.0.4-2.woody.4.diff.gz
qpopper (4.0.4-2.woody.4) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * No-changes rebuilt so that the package can migrate into proposed
    updates, since binary files from the former upload got lost on
    ftpmaster
  * Fixes mail user privilege escalation (DSA 259, CVE-2003-0143)


stable/main/binary-sparc/python2.2_2.2.1-4.7_sparc.deb
stable/main/binary-sparc/python2.2-dev_2.2.1-4.7_sparc.deb
stable/main/binary-sparc/python2.2-gdbm_2.2.1-4.7_sparc.deb
stable/main/binary-sparc/python2.2-mpz_2.2.1-4.7_sparc.deb
stable/main/binary-sparc/python2.2-xmlbase_2.2.1-4.7_sparc.deb
stable/main/binary-sparc/python2.2-tk_2.2.1-4.7_sparc.deb
python2.2 (2.2.1-4.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a design flaw in the XML/RPC Server
    implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089,
    security_CAN-2005-0089_xml.dpatch]


stable/main/binary-s390/python2.2-tk_2.2.1-4.7_s390.deb
stable/main/binary-s390/python2.2-mpz_2.2.1-4.7_s390.deb
stable/main/binary-s390/python2.2_2.2.1-4.7_s390.deb
stable/main/binary-s390/python2.2-gdbm_2.2.1-4.7_s390.deb
stable/main/binary-s390/python2.2-xmlbase_2.2.1-4.7_s390.deb
stable/main/binary-s390/python2.2-dev_2.2.1-4.7_s390.deb
python2.2 (2.2.1-4.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a design flaw in the XML/RPC Server
    implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089,
    security_CAN-2005-0089_xml.dpatch]


stable/main/binary-powerpc/python2.2_2.2.1-4.7_powerpc.deb
stable/main/binary-powerpc/python2.2-xmlbase_2.2.1-4.7_powerpc.deb
stable/main/binary-powerpc/python2.2-gdbm_2.2.1-4.7_powerpc.deb
stable/main/binary-powerpc/python2.2-mpz_2.2.1-4.7_powerpc.deb
stable/main/binary-powerpc/python2.2-dev_2.2.1-4.7_powerpc.deb
stable/main/binary-powerpc/python2.2-tk_2.2.1-4.7_powerpc.deb
python2.2 (2.2.1-4.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a design flaw in the XML/RPC Server
    implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089,
    security_CAN-2005-0089_xml.dpatch]


stable/main/binary-mips/python2.2-dev_2.2.1-4.7_mips.deb
stable/main/binary-mips/python2.2-mpz_2.2.1-4.7_mips.deb
stable/main/binary-mips/python2.2-gdbm_2.2.1-4.7_mips.deb
stable/main/binary-mips/python2.2_2.2.1-4.7_mips.deb
stable/main/binary-mips/python2.2-xmlbase_2.2.1-4.7_mips.deb
stable/main/binary-mips/python2.2-tk_2.2.1-4.7_mips.deb
python2.2 (2.2.1-4.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a design flaw in the XML/RPC Server
    implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089,
    security_CAN-2005-0089_xml.dpatch]


stable/main/binary-m68k/python2.2-gdbm_2.2.1-4.7_m68k.deb
stable/main/binary-m68k/python2.2-tk_2.2.1-4.7_m68k.deb
stable/main/binary-m68k/python2.2_2.2.1-4.7_m68k.deb
stable/main/binary-m68k/python2.2-dev_2.2.1-4.7_m68k.deb
stable/main/binary-m68k/python2.2-xmlbase_2.2.1-4.7_m68k.deb
stable/main/binary-m68k/python2.2-mpz_2.2.1-4.7_m68k.deb
python2.2 (2.2.1-4.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a design flaw in the XML/RPC Server
    implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089,
    security_CAN-2005-0089_xml.dpatch]


stable/main/binary-ia64/python2.2-tk_2.2.1-4.7_ia64.deb
stable/main/binary-ia64/python2.2-mpz_2.2.1-4.7_ia64.deb
stable/main/binary-ia64/python2.2-gdbm_2.2.1-4.7_ia64.deb
stable/main/binary-ia64/python2.2-xmlbase_2.2.1-4.7_ia64.deb
stable/main/binary-ia64/python2.2_2.2.1-4.7_ia64.deb
stable/main/binary-ia64/python2.2-dev_2.2.1-4.7_ia64.deb
python2.2 (2.2.1-4.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a design flaw in the XML/RPC Server
    implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089,
    security_CAN-2005-0089_xml.dpatch]


stable/main/binary-i386/python2.2-mpz_2.2.1-4.7_i386.deb
stable/main/binary-i386/python2.2-dev_2.2.1-4.7_i386.deb
stable/main/binary-i386/python2.2-gdbm_2.2.1-4.7_i386.deb
stable/main/binary-i386/python2.2-tk_2.2.1-4.7_i386.deb
stable/main/binary-i386/python2.2-xmlbase_2.2.1-4.7_i386.deb
stable/main/binary-i386/python2.2_2.2.1-4.7_i386.deb
python2.2 (2.2.1-4.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a design flaw in the XML/RPC Server
    implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089,
    security_CAN-2005-0089_xml.dpatch]


stable/main/binary-hppa/python2.2_2.2.1-4.7_hppa.deb
stable/main/binary-hppa/python2.2-tk_2.2.1-4.7_hppa.deb
stable/main/binary-hppa/python2.2-mpz_2.2.1-4.7_hppa.deb
stable/main/binary-hppa/python2.2-gdbm_2.2.1-4.7_hppa.deb
stable/main/binary-hppa/python2.2-xmlbase_2.2.1-4.7_hppa.deb
stable/main/binary-hppa/python2.2-dev_2.2.1-4.7_hppa.deb
python2.2 (2.2.1-4.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a design flaw in the XML/RPC Server
    implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089,
    security_CAN-2005-0089_xml.dpatch]


stable/main/binary-arm/python2.2-xmlbase_2.2.1-4.7_arm.deb
stable/main/binary-arm/python2.2-mpz_2.2.1-4.7_arm.deb
stable/main/binary-arm/python2.2-gdbm_2.2.1-4.7_arm.deb
stable/main/binary-arm/python2.2-dev_2.2.1-4.7_arm.deb
stable/main/binary-arm/python2.2-tk_2.2.1-4.7_arm.deb
stable/main/binary-arm/python2.2_2.2.1-4.7_arm.deb
python2.2 (2.2.1-4.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a design flaw in the XML/RPC Server
    implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089,
    security_CAN-2005-0089_xml.dpatch]


stable/main/binary-alpha/python2.2-xmlbase_2.2.1-4.7_alpha.deb
stable/main/binary-alpha/python2.2-dev_2.2.1-4.7_alpha.deb
stable/main/binary-alpha/python2.2-tk_2.2.1-4.7_alpha.deb
stable/main/binary-alpha/python2.2-mpz_2.2.1-4.7_alpha.deb
stable/main/binary-alpha/python2.2-gdbm_2.2.1-4.7_alpha.deb
stable/main/binary-alpha/python2.2_2.2.1-4.7_alpha.deb
python2.2 (2.2.1-4.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a design flaw in the XML/RPC Server
    implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089,
    security_CAN-2005-0089_xml.dpatch]


stable/main/binary-mipsel/python2.2-tk_2.2.1-4.7_mipsel.deb
stable/main/binary-all/python2.2-examples_2.2.1-4.7_all.deb
stable/main/binary-mipsel/python2.2-dev_2.2.1-4.7_mipsel.deb
stable/main/binary-mipsel/python2.2-xmlbase_2.2.1-4.7_mipsel.deb
stable/main/binary-mipsel/python2.2-gdbm_2.2.1-4.7_mipsel.deb
stable/main/binary-all/idle-python2.2_2.2.1-4.7_all.deb
stable/main/binary-mipsel/python2.2-mpz_2.2.1-4.7_mipsel.deb
stable/main/source/python2.2_2.2.1-4.7.diff.gz
stable/main/binary-all/python2.2-elisp_2.2.1-4.7_all.deb
stable/main/source/python2.2_2.2.1-4.7.dsc
stable/main/binary-all/python2.2-doc_2.2.1-4.7_all.deb
stable/main/binary-mipsel/python2.2_2.2.1-4.7_mipsel.deb
python2.2 (2.2.1-4.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a design flaw in the XML/RPC Server
    implementation [Lib/SimpleXMLRPCServer.py, CAN-2005-0089,
    security_CAN-2005-0089_xml.dpatch]


stable/main/binary-sparc/prozilla_1.3.6-3woody1_sparc.deb
prozilla (1:1.3.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows [src/curses.c,
    src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c,
    src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120]


stable/main/binary-s390/prozilla_1.3.6-3woody1_s390.deb
prozilla (1:1.3.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows [src/curses.c,
    src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c,
    src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120]


stable/main/binary-powerpc/prozilla_1.3.6-3woody1_powerpc.deb
prozilla (1:1.3.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows [src/curses.c,
    src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c,
    src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120]


stable/main/binary-mips/prozilla_1.3.6-3woody1_mips.deb
prozilla (1:1.3.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows [src/curses.c,
    src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c,
    src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120]


stable/main/binary-m68k/prozilla_1.3.6-3woody1_m68k.deb
prozilla (1:1.3.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows [src/curses.c,
    src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c,
    src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120]


stable/main/binary-ia64/prozilla_1.3.6-3woody1_ia64.deb
prozilla (1:1.3.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows [src/curses.c,
    src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c,
    src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120]


stable/main/binary-i386/prozilla_1.3.6-3woody1_i386.deb
prozilla (1:1.3.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows [src/curses.c,
    src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c,
    src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120]


stable/main/binary-hppa/prozilla_1.3.6-3woody1_hppa.deb
prozilla (1:1.3.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows [src/curses.c,
    src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c,
    src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120]


stable/main/binary-arm/prozilla_1.3.6-3woody1_arm.deb
prozilla (1:1.3.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows [src/curses.c,
    src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c,
    src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120]


stable/main/binary-alpha/prozilla_1.3.6-3woody1_alpha.deb
prozilla (1:1.3.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows [src/curses.c,
    src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c,
    src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120]


stable/main/binary-mipsel/prozilla_1.3.6-3woody1_mipsel.deb
stable/main/source/prozilla_1.3.6-3woody1.dsc
stable/main/source/prozilla_1.3.6-3woody1.diff.gz
prozilla (1:1.3.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows [src/curses.c,
    src/debug.c, src/ftp.c, src/ftp-retr.c, src/ftpsearch.c, src/http.c,
    src/http-retr.c, src/logfile.c, src/main.c, CAN-2004-1120]


stable/main/binary-sparc/odbc-postgresql_7.2.1-2woody8_sparc.deb
stable/main/binary-sparc/postgresql-dev_7.2.1-2woody8_sparc.deb
stable/main/binary-sparc/postgresql-contrib_7.2.1-2woody8_sparc.deb
stable/main/binary-sparc/libpgsql2_7.2.1-2woody8_sparc.deb
stable/main/binary-sparc/pgaccess_7.2.1-2woody8_sparc.deb
stable/main/binary-sparc/postgresql-client_7.2.1-2woody8_sparc.deb
stable/main/binary-sparc/python-pygresql_7.2.1-2woody8_sparc.deb
stable/main/binary-sparc/libpgperl_7.2.1-2woody8_sparc.deb
stable/main/binary-sparc/libpgtcl_7.2.1-2woody8_sparc.deb
stable/main/binary-sparc/postgresql_7.2.1-2woody8_sparc.deb
stable/main/binary-sparc/libecpg3_7.2.1-2woody8_sparc.deb
postgresql (7.2.1-2woody8) stable-security; urgency=low
  * Maintainer security upload to fix various vulnerabilities.
  * src/pl/plpgsql/src/gram.y:
    - Check various array boundaries to prevent buffer overflows.
    - References:
      CAN-2005-0245
      CAN-2005-0247
  * Notes:
    - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not
      apply.
    - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246
      does not apply.
  * Added CAN number to previous changelog.


stable/main/binary-s390/postgresql-client_7.2.1-2woody8_s390.deb
stable/main/binary-s390/pgaccess_7.2.1-2woody8_s390.deb
stable/main/binary-s390/libpgperl_7.2.1-2woody8_s390.deb
stable/main/binary-s390/python-pygresql_7.2.1-2woody8_s390.deb
stable/main/binary-s390/postgresql-contrib_7.2.1-2woody8_s390.deb
stable/main/binary-s390/postgresql-dev_7.2.1-2woody8_s390.deb
stable/main/binary-s390/libpgtcl_7.2.1-2woody8_s390.deb
stable/main/binary-s390/odbc-postgresql_7.2.1-2woody8_s390.deb
stable/main/binary-s390/postgresql_7.2.1-2woody8_s390.deb
stable/main/binary-s390/libpgsql2_7.2.1-2woody8_s390.deb
stable/main/binary-s390/libecpg3_7.2.1-2woody8_s390.deb
postgresql (7.2.1-2woody8) stable-security; urgency=low
  * Maintainer security upload to fix various vulnerabilities.
  * src/pl/plpgsql/src/gram.y:
    - Check various array boundaries to prevent buffer overflows.
    - References:
      CAN-2005-0245
      CAN-2005-0247
  * Notes:
    - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not
      apply.
    - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246
      does not apply.
  * Added CAN number to previous changelog.


stable/main/binary-powerpc/libpgperl_7.2.1-2woody8_powerpc.deb
stable/main/binary-powerpc/libpgsql2_7.2.1-2woody8_powerpc.deb
stable/main/binary-powerpc/postgresql-client_7.2.1-2woody8_powerpc.deb
stable/main/binary-powerpc/pgaccess_7.2.1-2woody8_powerpc.deb
stable/main/binary-powerpc/libpgtcl_7.2.1-2woody8_powerpc.deb
stable/main/binary-powerpc/python-pygresql_7.2.1-2woody8_powerpc.deb
stable/main/binary-powerpc/odbc-postgresql_7.2.1-2woody8_powerpc.deb
stable/main/binary-powerpc/postgresql-dev_7.2.1-2woody8_powerpc.deb
stable/main/binary-powerpc/libecpg3_7.2.1-2woody8_powerpc.deb
stable/main/binary-powerpc/postgresql-contrib_7.2.1-2woody8_powerpc.deb
stable/main/binary-powerpc/postgresql_7.2.1-2woody8_powerpc.deb
postgresql (7.2.1-2woody8) stable-security; urgency=low
  * Maintainer security upload to fix various vulnerabilities.
  * src/pl/plpgsql/src/gram.y:
    - Check various array boundaries to prevent buffer overflows.
    - References:
      CAN-2005-0245
      CAN-2005-0247
  * Notes:
    - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not
      apply.
    - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246
      does not apply.
  * Added CAN number to previous changelog.


stable/main/binary-mipsel/python-pygresql_7.2.1-2woody8_mipsel.deb
stable/main/binary-mipsel/odbc-postgresql_7.2.1-2woody8_mipsel.deb
stable/main/binary-mipsel/libpgtcl_7.2.1-2woody8_mipsel.deb
stable/main/binary-mipsel/postgresql-contrib_7.2.1-2woody8_mipsel.deb
stable/main/binary-mipsel/libpgsql2_7.2.1-2woody8_mipsel.deb
stable/main/binary-mipsel/libecpg3_7.2.1-2woody8_mipsel.deb
stable/main/binary-mipsel/postgresql_7.2.1-2woody8_mipsel.deb
stable/main/binary-mipsel/postgresql-dev_7.2.1-2woody8_mipsel.deb
stable/main/binary-mipsel/postgresql-client_7.2.1-2woody8_mipsel.deb
stable/main/binary-mipsel/pgaccess_7.2.1-2woody8_mipsel.deb
stable/main/binary-mipsel/libpgperl_7.2.1-2woody8_mipsel.deb
postgresql (7.2.1-2woody8) stable-security; urgency=low
  * Maintainer security upload to fix various vulnerabilities.
  * src/pl/plpgsql/src/gram.y:
    - Check various array boundaries to prevent buffer overflows.
    - References:
      CAN-2005-0245
      CAN-2005-0247
  * Notes:
    - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not
      apply.
    - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246
      does not apply.
  * Added CAN number to previous changelog.


stable/main/binary-mips/postgresql-dev_7.2.1-2woody8_mips.deb
stable/main/binary-mips/libpgtcl_7.2.1-2woody8_mips.deb
stable/main/binary-mips/postgresql_7.2.1-2woody8_mips.deb
stable/main/binary-mips/pgaccess_7.2.1-2woody8_mips.deb
stable/main/binary-mips/libpgperl_7.2.1-2woody8_mips.deb
stable/main/binary-mips/libecpg3_7.2.1-2woody8_mips.deb
stable/main/binary-mips/python-pygresql_7.2.1-2woody8_mips.deb
stable/main/binary-mips/odbc-postgresql_7.2.1-2woody8_mips.deb
stable/main/binary-mips/postgresql-client_7.2.1-2woody8_mips.deb
stable/main/binary-mips/libpgsql2_7.2.1-2woody8_mips.deb
stable/main/binary-mips/postgresql-contrib_7.2.1-2woody8_mips.deb
postgresql (7.2.1-2woody8) stable-security; urgency=low
  * Maintainer security upload to fix various vulnerabilities.
  * src/pl/plpgsql/src/gram.y:
    - Check various array boundaries to prevent buffer overflows.
    - References:
      CAN-2005-0245
      CAN-2005-0247
  * Notes:
    - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not
      apply.
    - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246
      does not apply.
  * Added CAN number to previous changelog.


stable/main/binary-m68k/postgresql-dev_7.2.1-2woody8_m68k.deb
stable/main/binary-m68k/libecpg3_7.2.1-2woody8_m68k.deb
stable/main/binary-m68k/postgresql-contrib_7.2.1-2woody8_m68k.deb
stable/main/binary-m68k/libpgtcl_7.2.1-2woody8_m68k.deb
stable/main/binary-m68k/python-pygresql_7.2.1-2woody8_m68k.deb
stable/main/binary-m68k/libpgperl_7.2.1-2woody8_m68k.deb
stable/main/binary-m68k/libpgsql2_7.2.1-2woody8_m68k.deb
stable/main/binary-m68k/odbc-postgresql_7.2.1-2woody8_m68k.deb
stable/main/binary-m68k/pgaccess_7.2.1-2woody8_m68k.deb
stable/main/binary-m68k/postgresql-client_7.2.1-2woody8_m68k.deb
stable/main/binary-m68k/postgresql_7.2.1-2woody8_m68k.deb
postgresql (7.2.1-2woody8) stable-security; urgency=low
  * Maintainer security upload to fix various vulnerabilities.
  * src/pl/plpgsql/src/gram.y:
    - Check various array boundaries to prevent buffer overflows.
    - References:
      CAN-2005-0245
      CAN-2005-0247
  * Notes:
    - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not
      apply.
    - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246
      does not apply.
  * Added CAN number to previous changelog.


stable/main/binary-ia64/postgresql_7.2.1-2woody8_ia64.deb
stable/main/binary-ia64/pgaccess_7.2.1-2woody8_ia64.deb
stable/main/binary-ia64/libpgperl_7.2.1-2woody8_ia64.deb
stable/main/binary-ia64/postgresql-dev_7.2.1-2woody8_ia64.deb
stable/main/binary-ia64/libecpg3_7.2.1-2woody8_ia64.deb
stable/main/binary-ia64/odbc-postgresql_7.2.1-2woody8_ia64.deb
stable/main/binary-ia64/libpgtcl_7.2.1-2woody8_ia64.deb
stable/main/binary-ia64/libpgsql2_7.2.1-2woody8_ia64.deb
stable/main/binary-ia64/postgresql-contrib_7.2.1-2woody8_ia64.deb
stable/main/binary-ia64/postgresql-client_7.2.1-2woody8_ia64.deb
stable/main/binary-ia64/python-pygresql_7.2.1-2woody8_ia64.deb
postgresql (7.2.1-2woody8) stable-security; urgency=low
  * Maintainer security upload to fix various vulnerabilities.
  * src/pl/plpgsql/src/gram.y:
    - Check various array boundaries to prevent buffer overflows.
    - References:
      CAN-2005-0245
      CAN-2005-0247
  * Notes:
    - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not
      apply.
    - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246
      does not apply.
  * Added CAN number to previous changelog.


stable/main/binary-hppa/postgresql-contrib_7.2.1-2woody8_hppa.deb
stable/main/binary-hppa/libpgperl_7.2.1-2woody8_hppa.deb
stable/main/binary-hppa/libecpg3_7.2.1-2woody8_hppa.deb
stable/main/binary-hppa/libpgtcl_7.2.1-2woody8_hppa.deb
stable/main/binary-hppa/python-pygresql_7.2.1-2woody8_hppa.deb
stable/main/binary-hppa/libpgsql2_7.2.1-2woody8_hppa.deb
stable/main/binary-hppa/postgresql-client_7.2.1-2woody8_hppa.deb
stable/main/binary-hppa/postgresql_7.2.1-2woody8_hppa.deb
stable/main/binary-hppa/odbc-postgresql_7.2.1-2woody8_hppa.deb
stable/main/binary-hppa/pgaccess_7.2.1-2woody8_hppa.deb
stable/main/binary-hppa/postgresql-dev_7.2.1-2woody8_hppa.deb
postgresql (7.2.1-2woody8) stable-security; urgency=low
  * Maintainer security upload to fix various vulnerabilities.
  * src/pl/plpgsql/src/gram.y:
    - Check various array boundaries to prevent buffer overflows.
    - References:
      CAN-2005-0245
      CAN-2005-0247
  * Notes:
    - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not
      apply.
    - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246
      does not apply.
  * Added CAN number to previous changelog.


stable/main/binary-arm/libpgsql2_7.2.1-2woody8_arm.deb
stable/main/binary-arm/postgresql-contrib_7.2.1-2woody8_arm.deb
stable/main/binary-arm/postgresql-dev_7.2.1-2woody8_arm.deb
stable/main/binary-arm/odbc-postgresql_7.2.1-2woody8_arm.deb
stable/main/binary-arm/libpgtcl_7.2.1-2woody8_arm.deb
stable/main/binary-arm/pgaccess_7.2.1-2woody8_arm.deb
stable/main/binary-arm/postgresql-client_7.2.1-2woody8_arm.deb
stable/main/binary-arm/postgresql_7.2.1-2woody8_arm.deb
stable/main/binary-arm/libecpg3_7.2.1-2woody8_arm.deb
stable/main/binary-arm/python-pygresql_7.2.1-2woody8_arm.deb
stable/main/binary-arm/libpgperl_7.2.1-2woody8_arm.deb
postgresql (7.2.1-2woody8) stable-security; urgency=low
  * Maintainer security upload to fix various vulnerabilities.
  * src/pl/plpgsql/src/gram.y:
    - Check various array boundaries to prevent buffer overflows.
    - References:
      CAN-2005-0245
      CAN-2005-0247
  * Notes:
    - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not
      apply.
    - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246
      does not apply.
  * Added CAN number to previous changelog.


stable/main/binary-alpha/libecpg3_7.2.1-2woody8_alpha.deb
stable/main/binary-alpha/postgresql-client_7.2.1-2woody8_alpha.deb
stable/main/binary-alpha/libpgperl_7.2.1-2woody8_alpha.deb
stable/main/binary-alpha/postgresql-dev_7.2.1-2woody8_alpha.deb
stable/main/binary-alpha/python-pygresql_7.2.1-2woody8_alpha.deb
stable/main/binary-alpha/postgresql-contrib_7.2.1-2woody8_alpha.deb
stable/main/binary-alpha/libpgtcl_7.2.1-2woody8_alpha.deb
stable/main/binary-alpha/postgresql_7.2.1-2woody8_alpha.deb
stable/main/binary-alpha/libpgsql2_7.2.1-2woody8_alpha.deb
stable/main/binary-alpha/pgaccess_7.2.1-2woody8_alpha.deb
stable/main/binary-alpha/odbc-postgresql_7.2.1-2woody8_alpha.deb
postgresql (7.2.1-2woody8) stable-security; urgency=low
  * Maintainer security upload to fix various vulnerabilities.
  * src/pl/plpgsql/src/gram.y:
    - Check various array boundaries to prevent buffer overflows.
    - References:
      CAN-2005-0245
      CAN-2005-0247
  * Notes:
    - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not
      apply.
    - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246
      does not apply.
  * Added CAN number to previous changelog.


stable/main/source/postgresql_7.2.1-2woody8.dsc
stable/main/binary-i386/postgresql_7.2.1-2woody8_i386.deb
stable/main/binary-all/postgresql-doc_7.2.1-2woody8_all.deb
stable/main/binary-i386/odbc-postgresql_7.2.1-2woody8_i386.deb
stable/main/binary-i386/libpgtcl_7.2.1-2woody8_i386.deb
stable/main/binary-i386/libpgsql2_7.2.1-2woody8_i386.deb
stable/main/source/postgresql_7.2.1-2woody8.diff.gz
stable/main/binary-i386/libecpg3_7.2.1-2woody8_i386.deb
stable/main/binary-i386/postgresql-client_7.2.1-2woody8_i386.deb
stable/main/binary-i386/postgresql-contrib_7.2.1-2woody8_i386.deb
stable/main/binary-i386/python-pygresql_7.2.1-2woody8_i386.deb
stable/main/binary-i386/libpgperl_7.2.1-2woody8_i386.deb
stable/main/binary-i386/postgresql-dev_7.2.1-2woody8_i386.deb
stable/main/binary-i386/pgaccess_7.2.1-2woody8_i386.deb
postgresql (7.2.1-2woody8) stable-security; urgency=low
  * Maintainer security upload to fix various vulnerabilities.
  * src/pl/plpgsql/src/gram.y:
    - Check various array boundaries to prevent buffer overflows.
    - References:
      CAN-2005-0245
      CAN-2005-0247
  * Notes:
    - 7.2 does not yet support GRANT on functions, thus CAN-2005-0244 does not
      apply.
    - 7.2 does not yet contain the "intagg" contrib module, thus CAN-2005-0246
      does not apply.
  * Added CAN number to previous changelog.


stable/main/binary-sparc/playmidi_2.4-4woody1_sparc.deb
playmidi (2.4-4woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow in command line handling.
    [playmidi.c, CAN-2005-0020]


stable/main/binary-s390/playmidi_2.4-4woody1_s390.deb
playmidi (2.4-4woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow in command line handling.
    [playmidi.c, CAN-2005-0020]


stable/main/binary-powerpc/playmidi_2.4-4woody1_powerpc.deb
playmidi (2.4-4woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow in command line handling.
    [playmidi.c, CAN-2005-0020]


stable/main/binary-mipsel/playmidi_2.4-4woody1_mipsel.deb
playmidi (2.4-4woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow in command line handling.
    [playmidi.c, CAN-2005-0020]


stable/main/binary-mips/playmidi_2.4-4woody1_mips.deb
playmidi (2.4-4woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow in command line handling.
    [playmidi.c, CAN-2005-0020]


stable/main/binary-m68k/playmidi_2.4-4woody1_m68k.deb
playmidi (2.4-4woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow in command line handling.
    [playmidi.c, CAN-2005-0020]


stable/main/binary-ia64/playmidi_2.4-4woody1_ia64.deb
playmidi (2.4-4woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow in command line handling.
    [playmidi.c, CAN-2005-0020]


stable/main/binary-hppa/playmidi_2.4-4woody1_hppa.deb
playmidi (2.4-4woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow in command line handling.
    [playmidi.c, CAN-2005-0020]


stable/main/binary-arm/playmidi_2.4-4woody1_arm.deb
playmidi (2.4-4woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow in command line handling.
    [playmidi.c, CAN-2005-0020]


stable/main/binary-alpha/playmidi_2.4-4woody1_alpha.deb
playmidi (2.4-4woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow in command line handling.
    [playmidi.c, CAN-2005-0020]


stable/main/source/playmidi_2.4-4woody1.diff.gz
stable/main/source/playmidi_2.4-4woody1.dsc
stable/main/binary-i386/playmidi_2.4-4woody1_i386.deb
playmidi (2.4-4woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow in command line handling.
    [playmidi.c, CAN-2005-0020]


stable/main/binary-sparc/libperl-dev_5.6.1-8.9_sparc.deb
stable/main/binary-sparc/libperl5.6_5.6.1-8.9_sparc.deb
stable/main/binary-sparc/perl_5.6.1-8.9_sparc.deb
stable/main/binary-sparc/perl-suid_5.6.1-8.9_sparc.deb
stable/main/binary-sparc/perl-debug_5.6.1-8.9_sparc.deb
stable/main/binary-sparc/perl-base_5.6.1-8.9_sparc.deb
perl (5.6.1-8.9) stable-security; urgency=high
  * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race
    condition which allows an attacker with write permission on
    directories in the tree being removed to make files setuid or to
    remove arbitrary files (closes: #286905, #286922).  Supersedes
    the previous patch for CAN-2004-0452.


stable/main/binary-s390/libperl-dev_5.6.1-8.9_s390.deb
stable/main/binary-s390/perl-base_5.6.1-8.9_s390.deb
stable/main/binary-s390/perl-suid_5.6.1-8.9_s390.deb
stable/main/binary-s390/perl-debug_5.6.1-8.9_s390.deb
stable/main/binary-s390/perl_5.6.1-8.9_s390.deb
stable/main/binary-s390/libperl5.6_5.6.1-8.9_s390.deb
perl (5.6.1-8.9) stable-security; urgency=high
  * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race
    condition which allows an attacker with write permission on
    directories in the tree being removed to make files setuid or to
    remove arbitrary files (closes: #286905, #286922).  Supersedes
    the previous patch for CAN-2004-0452.


stable/main/binary-powerpc/libperl5.6_5.6.1-8.9_powerpc.deb
stable/main/binary-powerpc/perl_5.6.1-8.9_powerpc.deb
stable/main/binary-powerpc/perl-base_5.6.1-8.9_powerpc.deb
stable/main/binary-powerpc/perl-suid_5.6.1-8.9_powerpc.deb
stable/main/binary-powerpc/perl-debug_5.6.1-8.9_powerpc.deb
stable/main/binary-powerpc/libperl-dev_5.6.1-8.9_powerpc.deb
perl (5.6.1-8.9) stable-security; urgency=high
  * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race
    condition which allows an attacker with write permission on
    directories in the tree being removed to make files setuid or to
    remove arbitrary files (closes: #286905, #286922).  Supersedes
    the previous patch for CAN-2004-0452.


stable/main/binary-mipsel/libperl5.6_5.6.1-8.9_mipsel.deb
stable/main/binary-mipsel/libperl-dev_5.6.1-8.9_mipsel.deb
stable/main/binary-mipsel/perl-suid_5.6.1-8.9_mipsel.deb
stable/main/binary-mipsel/perl-debug_5.6.1-8.9_mipsel.deb
stable/main/binary-mipsel/perl-base_5.6.1-8.9_mipsel.deb
stable/main/binary-mipsel/perl_5.6.1-8.9_mipsel.deb
perl (5.6.1-8.9) stable-security; urgency=high
  * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race
    condition which allows an attacker with write permission on
    directories in the tree being removed to make files setuid or to
    remove arbitrary files (closes: #286905, #286922).  Supersedes
    the previous patch for CAN-2004-0452.


stable/main/binary-mips/perl_5.6.1-8.9_mips.deb
stable/main/binary-mips/libperl5.6_5.6.1-8.9_mips.deb
stable/main/binary-mips/libperl-dev_5.6.1-8.9_mips.deb
stable/main/binary-mips/perl-suid_5.6.1-8.9_mips.deb
stable/main/binary-mips/perl-debug_5.6.1-8.9_mips.deb
stable/main/binary-mips/perl-base_5.6.1-8.9_mips.deb
perl (5.6.1-8.9) stable-security; urgency=high
  * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race
    condition which allows an attacker with write permission on
    directories in the tree being removed to make files setuid or to
    remove arbitrary files (closes: #286905, #286922).  Supersedes
    the previous patch for CAN-2004-0452.


stable/main/binary-m68k/libperl5.6_5.6.1-8.9_m68k.deb
stable/main/binary-m68k/perl_5.6.1-8.9_m68k.deb
stable/main/binary-m68k/libperl-dev_5.6.1-8.9_m68k.deb
stable/main/binary-m68k/perl-base_5.6.1-8.9_m68k.deb
stable/main/binary-m68k/perl-debug_5.6.1-8.9_m68k.deb
stable/main/binary-m68k/perl-suid_5.6.1-8.9_m68k.deb
perl (5.6.1-8.9) stable-security; urgency=high
  * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race
    condition which allows an attacker with write permission on
    directories in the tree being removed to make files setuid or to
    remove arbitrary files (closes: #286905, #286922).  Supersedes
    the previous patch for CAN-2004-0452.


stable/main/binary-ia64/perl-debug_5.6.1-8.9_ia64.deb
stable/main/binary-ia64/libperl-dev_5.6.1-8.9_ia64.deb
stable/main/binary-ia64/perl-base_5.6.1-8.9_ia64.deb
stable/main/binary-ia64/perl-suid_5.6.1-8.9_ia64.deb
stable/main/binary-ia64/perl_5.6.1-8.9_ia64.deb
stable/main/binary-ia64/libperl5.6_5.6.1-8.9_ia64.deb
perl (5.6.1-8.9) stable-security; urgency=high
  * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race
    condition which allows an attacker with write permission on
    directories in the tree being removed to make files setuid or to
    remove arbitrary files (closes: #286905, #286922).  Supersedes
    the previous patch for CAN-2004-0452.


stable/main/binary-hppa/perl-debug_5.6.1-8.9_hppa.deb
stable/main/binary-hppa/perl-base_5.6.1-8.9_hppa.deb
stable/main/binary-hppa/perl-suid_5.6.1-8.9_hppa.deb
stable/main/binary-hppa/perl_5.6.1-8.9_hppa.deb
stable/main/binary-hppa/libperl-dev_5.6.1-8.9_hppa.deb
stable/main/binary-hppa/libperl5.6_5.6.1-8.9_hppa.deb
perl (5.6.1-8.9) stable-security; urgency=high
  * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race
    condition which allows an attacker with write permission on
    directories in the tree being removed to make files setuid or to
    remove arbitrary files (closes: #286905, #286922).  Supersedes
    the previous patch for CAN-2004-0452.


stable/main/source/perl_5.6.1-8.9.diff.gz
stable/main/binary-all/libcgi-fast-perl_5.6.1-8.9_all.deb
stable/main/source/perl_5.6.1-8.9.dsc
stable/main/binary-all/perl-modules_5.6.1-8.9_all.deb
stable/main/binary-i386/libperl-dev_5.6.1-8.9_i386.deb
stable/main/binary-i386/perl-suid_5.6.1-8.9_i386.deb
stable/main/binary-all/perl-doc_5.6.1-8.9_all.deb
stable/main/binary-i386/perl-base_5.6.1-8.9_i386.deb
stable/main/binary-i386/libperl5.6_5.6.1-8.9_i386.deb
stable/main/binary-i386/perl_5.6.1-8.9_i386.deb
stable/main/binary-i386/perl-debug_5.6.1-8.9_i386.deb
perl (5.6.1-8.9) stable-security; urgency=high
  * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race
    condition which allows an attacker with write permission on
    directories in the tree being removed to make files setuid or to
    remove arbitrary files (closes: #286905, #286922).  Supersedes
    the previous patch for CAN-2004-0452.


stable/main/binary-arm/perl-suid_5.6.1-8.9_arm.deb
stable/main/binary-arm/perl-debug_5.6.1-8.9_arm.deb
stable/main/binary-arm/libperl5.6_5.6.1-8.9_arm.deb
stable/main/binary-arm/perl-base_5.6.1-8.9_arm.deb
stable/main/binary-arm/libperl-dev_5.6.1-8.9_arm.deb
stable/main/binary-arm/perl_5.6.1-8.9_arm.deb
perl (5.6.1-8.9) stable-security; urgency=high
  * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race
    condition which allows an attacker with write permission on
    directories in the tree being removed to make files setuid or to
    remove arbitrary files (closes: #286905, #286922).  Supersedes
    the previous patch for CAN-2004-0452.


stable/main/binary-alpha/perl-suid_5.6.1-8.9_alpha.deb
stable/main/binary-alpha/perl-debug_5.6.1-8.9_alpha.deb
stable/main/binary-alpha/libperl5.6_5.6.1-8.9_alpha.deb
stable/main/binary-alpha/perl_5.6.1-8.9_alpha.deb
stable/main/binary-alpha/perl-base_5.6.1-8.9_alpha.deb
stable/main/binary-alpha/libperl-dev_5.6.1-8.9_alpha.deb
perl (5.6.1-8.9) stable-security; urgency=high
  * SECURITY [CAN-2005-0448]: rewrite File::Path::rmtree to avoid race
    condition which allows an attacker with write permission on
    directories in the tree being removed to make files setuid or to
    remove arbitrary files (closes: #286905, #286922).  Supersedes
    the previous patch for CAN-2004-0452.


stable/main/binary-sparc/pcal_4.7-8woody1_sparc.deb
pcal (4.7-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix locally exploitable overflow in calandar file handling.
    [pcalutil.c, readfile.c,  CAN-2004-1289]


stable/main/binary-s390/pcal_4.7-8woody1_s390.deb
pcal (4.7-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix locally exploitable overflow in calandar file handling.
    [pcalutil.c, readfile.c,  CAN-2004-1289]


stable/main/binary-powerpc/pcal_4.7-8woody1_powerpc.deb
pcal (4.7-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix locally exploitable overflow in calandar file handling.
    [pcalutil.c, readfile.c,  CAN-2004-1289]


stable/main/binary-mipsel/pcal_4.7-8woody1_mipsel.deb
pcal (4.7-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix locally exploitable overflow in calandar file handling.
    [pcalutil.c, readfile.c,  CAN-2004-1289]


stable/main/binary-mips/pcal_4.7-8woody1_mips.deb
pcal (4.7-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix locally exploitable overflow in calandar file handling.
    [pcalutil.c, readfile.c,  CAN-2004-1289]


stable/main/binary-m68k/pcal_4.7-8woody1_m68k.deb
pcal (4.7-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix locally exploitable overflow in calandar file handling.
    [pcalutil.c, readfile.c,  CAN-2004-1289]


stable/main/binary-ia64/pcal_4.7-8woody1_ia64.deb
pcal (4.7-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix locally exploitable overflow in calandar file handling.
    [pcalutil.c, readfile.c,  CAN-2004-1289]


stable/main/binary-hppa/pcal_4.7-8woody1_hppa.deb
pcal (4.7-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix locally exploitable overflow in calandar file handling.
    [pcalutil.c, readfile.c,  CAN-2004-1289]


stable/main/binary-arm/pcal_4.7-8woody1_arm.deb
pcal (4.7-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix locally exploitable overflow in calandar file handling.
    [pcalutil.c, readfile.c,  CAN-2004-1289]


stable/main/binary-alpha/pcal_4.7-8woody1_alpha.deb
pcal (4.7-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix locally exploitable overflow in calandar file handling.
    [pcalutil.c, readfile.c,  CAN-2004-1289]


stable/main/source/pcal_4.7-8woody1.dsc
stable/main/binary-i386/pcal_4.7-8woody1_i386.deb
stable/main/source/pcal_4.7-8woody1.diff.gz
pcal (4.7-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix locally exploitable overflow in calandar file handling.
    [pcalutil.c, readfile.c,  CAN-2004-1289]


stable/main/binary-sparc/telnetd-ssl_0.17.17+0.1-2woody4_sparc.deb
stable/main/binary-sparc/telnet-ssl_0.17.17+0.1-2woody4_sparc.deb
netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-s390/telnet-ssl_0.17.17+0.1-2woody4_s390.deb
stable/main/binary-s390/telnetd-ssl_0.17.17+0.1-2woody4_s390.deb
netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-powerpc/telnet-ssl_0.17.17+0.1-2woody4_powerpc.deb
stable/main/binary-powerpc/telnetd-ssl_0.17.17+0.1-2woody4_powerpc.deb
netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-mips/telnet-ssl_0.17.17+0.1-2woody4_mips.deb
stable/main/binary-mips/telnetd-ssl_0.17.17+0.1-2woody4_mips.deb
netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-m68k/telnetd-ssl_0.17.17+0.1-2woody4_m68k.deb
stable/main/binary-m68k/telnet-ssl_0.17.17+0.1-2woody4_m68k.deb
netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-ia64/telnet-ssl_0.17.17+0.1-2woody4_ia64.deb
stable/main/binary-ia64/telnetd-ssl_0.17.17+0.1-2woody4_ia64.deb
netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-i386/telnetd-ssl_0.17.17+0.1-2woody4_i386.deb
stable/main/binary-i386/telnet-ssl_0.17.17+0.1-2woody4_i386.deb
netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-hppa/telnet-ssl_0.17.17+0.1-2woody4_hppa.deb
stable/main/binary-hppa/telnetd-ssl_0.17.17+0.1-2woody4_hppa.deb
netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-arm/telnet-ssl_0.17.17+0.1-2woody4_arm.deb
stable/main/binary-arm/telnetd-ssl_0.17.17+0.1-2woody4_arm.deb
netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-alpha/telnet-ssl_0.17.17+0.1-2woody4_alpha.deb
stable/main/binary-alpha/telnetd-ssl_0.17.17+0.1-2woody4_alpha.deb
netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/source/netkit-telnet-ssl_0.17.17+0.1-2woody4.diff.gz
stable/main/binary-mipsel/telnetd-ssl_0.17.17+0.1-2woody4_mipsel.deb
stable/main/source/netkit-telnet-ssl_0.17.17+0.1-2woody4.dsc
stable/main/binary-mipsel/telnet-ssl_0.17.17+0.1-2woody4_mipsel.deb
netkit-telnet-ssl (0.17.17+0.1-2woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-sparc/telnet_0.17-18woody3_sparc.deb
stable/main/binary-sparc/telnetd_0.17-18woody3_sparc.deb
netkit-telnet (0.17-18woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-s390/telnet_0.17-18woody3_s390.deb
stable/main/binary-s390/telnetd_0.17-18woody3_s390.deb
netkit-telnet (0.17-18woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-powerpc/telnetd_0.17-18woody3_powerpc.deb
stable/main/binary-powerpc/telnet_0.17-18woody3_powerpc.deb
netkit-telnet (0.17-18woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-mips/telnet_0.17-18woody3_mips.deb
stable/main/binary-mips/telnetd_0.17-18woody3_mips.deb
netkit-telnet (0.17-18woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-m68k/telnetd_0.17-18woody3_m68k.deb
stable/main/binary-m68k/telnet_0.17-18woody3_m68k.deb
netkit-telnet (0.17-18woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-ia64/telnet_0.17-18woody3_ia64.deb
stable/main/binary-ia64/telnetd_0.17-18woody3_ia64.deb
netkit-telnet (0.17-18woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-i386/telnetd_0.17-18woody3_i386.deb
stable/main/binary-i386/telnet_0.17-18woody3_i386.deb
netkit-telnet (0.17-18woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-hppa/telnet_0.17-18woody3_hppa.deb
stable/main/binary-hppa/telnetd_0.17-18woody3_hppa.deb
netkit-telnet (0.17-18woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-alpha/telnetd_0.17-18woody3_alpha.deb
stable/main/binary-alpha/telnet_0.17-18woody3_alpha.deb
netkit-telnet (0.17-18woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-mipsel/telnet_0.17-18woody3_mipsel.deb
stable/main/source/netkit-telnet_0.17-18woody3.diff.gz
stable/main/binary-mipsel/telnetd_0.17-18woody3_mipsel.deb
stable/main/source/netkit-telnet_0.17-18woody3.dsc
netkit-telnet (0.17-18woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to fix a buffer overflow in slc_add_reply()
    [telnet/telnet.cc, CAN-2005-0469]


stable/main/binary-sparc/rwhod_0.17-4woody2_sparc.deb
stable/main/binary-sparc/rwho_0.17-4woody2_sparc.deb
netkit-rwho (0.17-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Leasened the security precaution a bit [rwhod/rwhod.c,
    CAN-2004-1180]


stable/main/binary-s390/rwho_0.17-4woody2_s390.deb
stable/main/binary-s390/rwhod_0.17-4woody2_s390.deb
netkit-rwho (0.17-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Leasened the security precaution a bit [rwhod/rwhod.c,
    CAN-2004-1180]


stable/main/binary-powerpc/rwhod_0.17-4woody2_powerpc.deb
stable/main/binary-powerpc/rwho_0.17-4woody2_powerpc.deb
netkit-rwho (0.17-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Leasened the security precaution a bit [rwhod/rwhod.c,
    CAN-2004-1180]


stable/main/binary-mips/rwho_0.17-4woody2_mips.deb
stable/main/binary-mips/rwhod_0.17-4woody2_mips.deb
netkit-rwho (0.17-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Leasened the security precaution a bit [rwhod/rwhod.c,
    CAN-2004-1180]


stable/main/binary-m68k/rwhod_0.17-4woody2_m68k.deb
stable/main/binary-m68k/rwho_0.17-4woody2_m68k.deb
netkit-rwho (0.17-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Leasened the security precaution a bit [rwhod/rwhod.c,
    CAN-2004-1180]


stable/main/binary-ia64/rwhod_0.17-4woody2_ia64.deb
stable/main/binary-ia64/rwho_0.17-4woody2_ia64.deb
netkit-rwho (0.17-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Leasened the security precaution a bit [rwhod/rwhod.c,
    CAN-2004-1180]


stable/main/binary-i386/rwhod_0.17-4woody2_i386.deb
stable/main/binary-i386/rwho_0.17-4woody2_i386.deb
netkit-rwho (0.17-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Leasened the security precaution a bit [rwhod/rwhod.c,
    CAN-2004-1180]


stable/main/binary-hppa/rwho_0.17-4woody2_hppa.deb
stable/main/binary-hppa/rwhod_0.17-4woody2_hppa.deb
netkit-rwho (0.17-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Leasened the security precaution a bit [rwhod/rwhod.c,
    CAN-2004-1180]


stable/main/binary-arm/rwho_0.17-4woody2_arm.deb
stable/main/binary-arm/rwhod_0.17-4woody2_arm.deb
netkit-rwho (0.17-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Leasened the security precaution a bit [rwhod/rwhod.c,
    CAN-2004-1180]


stable/main/binary-alpha/rwho_0.17-4woody2_alpha.deb
stable/main/binary-alpha/rwhod_0.17-4woody2_alpha.deb
netkit-rwho (0.17-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Leasened the security precaution a bit [rwhod/rwhod.c,
    CAN-2004-1180]


stable/main/source/netkit-rwho_0.17-4woody2.diff.gz
stable/main/binary-mipsel/rwhod_0.17-4woody2_mipsel.deb
stable/main/binary-mipsel/rwho_0.17-4woody2_mipsel.deb
stable/main/source/netkit-rwho_0.17-4woody2.dsc
netkit-rwho (0.17-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Leasened the security precaution a bit [rwhod/rwhod.c,
    CAN-2004-1180]


stable/main/binary-sparc/ipx_2.2.0.18-10woody2_sparc.deb
stable/main/binary-sparc/ncpfs_2.2.0.18-10woody2_sparc.deb
ncpfs (2.2.0.18-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added ownership check for .nw* file and privilege release for fopen()
    [lib/ncplib.c, CAN-2005-0013]
  * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c,
    util/nwdir.c]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-s390/ipx_2.2.0.18-10woody2_s390.deb
stable/main/binary-s390/ncpfs_2.2.0.18-10woody2_s390.deb
ncpfs (2.2.0.18-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added ownership check for .nw* file and privilege release for fopen()
    [lib/ncplib.c, CAN-2005-0013]
  * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c,
    util/nwdir.c]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-powerpc/ncpfs_2.2.0.18-10woody2_powerpc.deb
stable/main/binary-powerpc/ipx_2.2.0.18-10woody2_powerpc.deb
ncpfs (2.2.0.18-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added ownership check for .nw* file and privilege release for fopen()
    [lib/ncplib.c, CAN-2005-0013]
  * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c,
    util/nwdir.c]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mips/ipx_2.2.0.18-10woody2_mips.deb
stable/main/binary-mips/ncpfs_2.2.0.18-10woody2_mips.deb
ncpfs (2.2.0.18-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added ownership check for .nw* file and privilege release for fopen()
    [lib/ncplib.c, CAN-2005-0013]
  * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c,
    util/nwdir.c]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-m68k/ncpfs_2.2.0.18-10woody2_m68k.deb
stable/main/binary-m68k/ipx_2.2.0.18-10woody2_m68k.deb
ncpfs (2.2.0.18-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added ownership check for .nw* file and privilege release for fopen()
    [lib/ncplib.c, CAN-2005-0013]
  * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c,
    util/nwdir.c]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-ia64/ipx_2.2.0.18-10woody2_ia64.deb
stable/main/binary-ia64/ncpfs_2.2.0.18-10woody2_ia64.deb
ncpfs (2.2.0.18-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added ownership check for .nw* file and privilege release for fopen()
    [lib/ncplib.c, CAN-2005-0013]
  * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c,
    util/nwdir.c]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-i386/ncpfs_2.2.0.18-10woody2_i386.deb
stable/main/binary-i386/ipx_2.2.0.18-10woody2_i386.deb
ncpfs (2.2.0.18-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added ownership check for .nw* file and privilege release for fopen()
    [lib/ncplib.c, CAN-2005-0013]
  * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c,
    util/nwdir.c]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-hppa/ipx_2.2.0.18-10woody2_hppa.deb
stable/main/binary-hppa/ncpfs_2.2.0.18-10woody2_hppa.deb
ncpfs (2.2.0.18-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added ownership check for .nw* file and privilege release for fopen()
    [lib/ncplib.c, CAN-2005-0013]
  * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c,
    util/nwdir.c]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-arm/ncpfs_2.2.0.18-10woody2_arm.deb
stable/main/binary-arm/ipx_2.2.0.18-10woody2_arm.deb
ncpfs (2.2.0.18-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added ownership check for .nw* file and privilege release for fopen()
    [lib/ncplib.c, CAN-2005-0013]
  * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c,
    util/nwdir.c]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-alpha/ncpfs_2.2.0.18-10woody2_alpha.deb
stable/main/binary-alpha/ipx_2.2.0.18-10woody2_alpha.deb
ncpfs (2.2.0.18-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added ownership check for .nw* file and privilege release for fopen()
    [lib/ncplib.c, CAN-2005-0013]
  * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c,
    util/nwdir.c]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mipsel/ipx_2.2.0.18-10woody2_mipsel.deb
stable/main/source/ncpfs_2.2.0.18-10woody2.dsc
stable/main/source/ncpfs_2.2.0.18-10woody2.diff.gz
stable/main/binary-mipsel/ncpfs_2.2.0.18-10woody2_mipsel.deb
ncpfs (2.2.0.18-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added ownership check for .nw* file and privilege release for fopen()
    [lib/ncplib.c, CAN-2005-0013]
  * Turned some sprintf() into snprintf () [lib/ncplib.c, util/nwpasswd.c,
    util/nwdir.c]
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-sparc/nasm_0.98.28cvs-1woody2_sparc.deb
nasm (0.98.28cvs-1woody2) stable-security; urgency=high
  * Fix broken upload, which was sent to the wrong upload queue.


stable/main/binary-s390/nasm_0.98.28cvs-1woody2_s390.deb
nasm (0.98.28cvs-1woody2) stable-security; urgency=high
  * Fix broken upload, which was sent to the wrong upload queue.


stable/main/binary-powerpc/nasm_0.98.28cvs-1woody2_powerpc.deb
nasm (0.98.28cvs-1woody2) stable-security; urgency=high
  * Fix broken upload, which was sent to the wrong upload queue.


stable/main/binary-mipsel/nasm_0.98.28cvs-1woody2_mipsel.deb
nasm (0.98.28cvs-1woody2) stable-security; urgency=high
  * Fix broken upload, which was sent to the wrong upload queue.


stable/main/binary-mips/nasm_0.98.28cvs-1woody2_mips.deb
nasm (0.98.28cvs-1woody2) stable-security; urgency=high
  * Fix broken upload, which was sent to the wrong upload queue.


stable/main/binary-m68k/nasm_0.98.28cvs-1woody2_m68k.deb
nasm (0.98.28cvs-1woody2) stable-security; urgency=high
  * Fix broken upload, which was sent to the wrong upload queue.


stable/main/binary-ia64/nasm_0.98.28cvs-1woody2_ia64.deb
nasm (0.98.28cvs-1woody2) stable-security; urgency=high
  * Fix broken upload, which was sent to the wrong upload queue.


stable/main/binary-hppa/nasm_0.98.28cvs-1woody2_hppa.deb
nasm (0.98.28cvs-1woody2) stable-security; urgency=high
  * Fix broken upload, which was sent to the wrong upload queue.


stable/main/binary-arm/nasm_0.98.28cvs-1woody2_arm.deb
nasm (0.98.28cvs-1woody2) stable-security; urgency=high
  * Fix broken upload, which was sent to the wrong upload queue.


stable/main/binary-alpha/nasm_0.98.28cvs-1woody2_alpha.deb
nasm (0.98.28cvs-1woody2) stable-security; urgency=high
  * Fix broken upload, which was sent to the wrong upload queue.


stable/main/source/nasm_0.98.28cvs-1woody2.dsc
stable/main/source/nasm_0.98.28cvs-1woody2.diff.gz
stable/main/binary-i386/nasm_0.98.28cvs-1woody2_i386.deb
nasm (0.98.28cvs-1woody2) stable-security; urgency=high
  * Fix broken upload, which was sent to the wrong upload queue.


stable/main/binary-sparc/libnmz3_2.0.10-1woody3_sparc.deb
stable/main/binary-sparc/namazu2_2.0.10-1woody3_sparc.deb
stable/main/binary-sparc/libnmz3-dev_2.0.10-1woody3_sparc.deb
namazu2 (2.0.10-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Restricted build-dependency to tk8.2 so that buildds have a chance to
    select a wish implementation.


stable/main/binary-s390/namazu2_2.0.10-1woody3_s390.deb
stable/main/binary-s390/libnmz3-dev_2.0.10-1woody3_s390.deb
stable/main/binary-s390/libnmz3_2.0.10-1woody3_s390.deb
namazu2 (2.0.10-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Restricted build-dependency to tk8.2 so that buildds have a chance to
    select a wish implementation.


stable/main/binary-powerpc/namazu2_2.0.10-1woody3_powerpc.deb
stable/main/binary-powerpc/libnmz3_2.0.10-1woody3_powerpc.deb
stable/main/binary-powerpc/libnmz3-dev_2.0.10-1woody3_powerpc.deb
namazu2 (2.0.10-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Restricted build-dependency to tk8.2 so that buildds have a chance to
    select a wish implementation.


stable/main/binary-mipsel/libnmz3-dev_2.0.10-1woody3_mipsel.deb
stable/main/binary-mipsel/libnmz3_2.0.10-1woody3_mipsel.deb
stable/main/binary-mipsel/namazu2_2.0.10-1woody3_mipsel.deb
namazu2 (2.0.10-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Restricted build-dependency to tk8.2 so that buildds have a chance to
    select a wish implementation.


stable/main/binary-mips/libnmz3_2.0.10-1woody3_mips.deb
stable/main/binary-mips/namazu2_2.0.10-1woody3_mips.deb
stable/main/binary-mips/libnmz3-dev_2.0.10-1woody3_mips.deb
namazu2 (2.0.10-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Restricted build-dependency to tk8.2 so that buildds have a chance to
    select a wish implementation.


stable/main/binary-m68k/libnmz3_2.0.10-1woody3_m68k.deb
stable/main/binary-m68k/libnmz3-dev_2.0.10-1woody3_m68k.deb
stable/main/binary-m68k/namazu2_2.0.10-1woody3_m68k.deb
namazu2 (2.0.10-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Restricted build-dependency to tk8.2 so that buildds have a chance to
    select a wish implementation.


stable/main/binary-ia64/libnmz3-dev_2.0.10-1woody3_ia64.deb
stable/main/binary-ia64/namazu2_2.0.10-1woody3_ia64.deb
stable/main/binary-ia64/libnmz3_2.0.10-1woody3_ia64.deb
namazu2 (2.0.10-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Restricted build-dependency to tk8.2 so that buildds have a chance to
    select a wish implementation.


stable/main/binary-hppa/libnmz3-dev_2.0.10-1woody3_hppa.deb
stable/main/binary-hppa/libnmz3_2.0.10-1woody3_hppa.deb
stable/main/binary-hppa/namazu2_2.0.10-1woody3_hppa.deb
namazu2 (2.0.10-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Restricted build-dependency to tk8.2 so that buildds have a chance to
    select a wish implementation.


stable/main/binary-arm/libnmz3-dev_2.0.10-1woody3_arm.deb
stable/main/binary-arm/namazu2_2.0.10-1woody3_arm.deb
stable/main/binary-arm/libnmz3_2.0.10-1woody3_arm.deb
namazu2 (2.0.10-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Restricted build-dependency to tk8.2 so that buildds have a chance to
    select a wish implementation.


stable/main/binary-alpha/namazu2_2.0.10-1woody3_alpha.deb
stable/main/binary-alpha/libnmz3-dev_2.0.10-1woody3_alpha.deb
stable/main/binary-alpha/libnmz3_2.0.10-1woody3_alpha.deb
namazu2 (2.0.10-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Restricted build-dependency to tk8.2 so that buildds have a chance to
    select a wish implementation.


stable/main/binary-i386/libnmz3-dev_2.0.10-1woody3_i386.deb
stable/main/binary-i386/namazu2_2.0.10-1woody3_i386.deb
stable/main/source/namazu2_2.0.10-1woody3.dsc
stable/main/binary-all/namazu2-common_2.0.10-1woody3_all.deb
stable/main/source/namazu2_2.0.10-1woody3.diff.gz
stable/main/binary-i386/libnmz3_2.0.10-1woody3_i386.deb
stable/main/binary-all/namazu2-index-tools_2.0.10-1woody3_all.deb
namazu2 (2.0.10-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Restricted build-dependency to tk8.2 so that buildds have a chance to
    select a wish implementation.


stable/main/binary-sparc/mysql-client_3.23.49-8.11_sparc.deb
stable/main/binary-sparc/libmysqlclient10_3.23.49-8.11_sparc.deb
stable/main/binary-sparc/mysql-server_3.23.49-8.11_sparc.deb
stable/main/binary-sparc/libmysqlclient10-dev_3.23.49-8.11_sparc.deb
mysql (3.23.49-8.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added important fix digged out by Tom Lane for the patch below that
    will initialise a variable [sql/ha_myisam.cc,
    debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff]


stable/main/binary-s390/mysql-client_3.23.49-8.11_s390.deb
stable/main/binary-s390/libmysqlclient10_3.23.49-8.11_s390.deb
stable/main/binary-s390/mysql-server_3.23.49-8.11_s390.deb
stable/main/binary-s390/libmysqlclient10-dev_3.23.49-8.11_s390.deb
mysql (3.23.49-8.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added important fix digged out by Tom Lane for the patch below that
    will initialise a variable [sql/ha_myisam.cc,
    debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff]


stable/main/binary-powerpc/libmysqlclient10_3.23.49-8.11_powerpc.deb
stable/main/binary-powerpc/libmysqlclient10-dev_3.23.49-8.11_powerpc.deb
stable/main/binary-powerpc/mysql-server_3.23.49-8.11_powerpc.deb
stable/main/binary-powerpc/mysql-client_3.23.49-8.11_powerpc.deb
mysql (3.23.49-8.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added important fix digged out by Tom Lane for the patch below that
    will initialise a variable [sql/ha_myisam.cc,
    debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff]


stable/main/binary-mipsel/mysql-server_3.23.49-8.11_mipsel.deb
stable/main/binary-mipsel/mysql-client_3.23.49-8.11_mipsel.deb
stable/main/binary-mipsel/libmysqlclient10_3.23.49-8.11_mipsel.deb
stable/main/binary-mipsel/libmysqlclient10-dev_3.23.49-8.11_mipsel.deb
mysql (3.23.49-8.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added important fix digged out by Tom Lane for the patch below that
    will initialise a variable [sql/ha_myisam.cc,
    debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff]


stable/main/binary-mips/libmysqlclient10_3.23.49-8.11_mips.deb
stable/main/binary-mips/mysql-server_3.23.49-8.11_mips.deb
stable/main/binary-mips/mysql-client_3.23.49-8.11_mips.deb
stable/main/binary-mips/libmysqlclient10-dev_3.23.49-8.11_mips.deb
mysql (3.23.49-8.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added important fix digged out by Tom Lane for the patch below that
    will initialise a variable [sql/ha_myisam.cc,
    debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff]


stable/main/binary-m68k/mysql-server_3.23.49-8.11_m68k.deb
stable/main/binary-m68k/libmysqlclient10_3.23.49-8.11_m68k.deb
stable/main/binary-m68k/libmysqlclient10-dev_3.23.49-8.11_m68k.deb
stable/main/binary-m68k/mysql-client_3.23.49-8.11_m68k.deb
mysql (3.23.49-8.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added important fix digged out by Tom Lane for the patch below that
    will initialise a variable [sql/ha_myisam.cc,
    debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff]


stable/main/binary-ia64/mysql-server_3.23.49-8.11_ia64.deb
stable/main/binary-ia64/libmysqlclient10-dev_3.23.49-8.11_ia64.deb
stable/main/binary-ia64/mysql-client_3.23.49-8.11_ia64.deb
stable/main/binary-ia64/libmysqlclient10_3.23.49-8.11_ia64.deb
mysql (3.23.49-8.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added important fix digged out by Tom Lane for the patch below that
    will initialise a variable [sql/ha_myisam.cc,
    debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff]


stable/main/binary-i386/libmysqlclient10-dev_3.23.49-8.11_i386.deb
stable/main/binary-i386/mysql-client_3.23.49-8.11_i386.deb
stable/main/binary-i386/mysql-server_3.23.49-8.11_i386.deb
stable/main/binary-i386/libmysqlclient10_3.23.49-8.11_i386.deb
mysql (3.23.49-8.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added important fix digged out by Tom Lane for the patch below that
    will initialise a variable [sql/ha_myisam.cc,
    debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff]


stable/main/binary-hppa/mysql-server_3.23.49-8.11_hppa.deb
stable/main/binary-hppa/libmysqlclient10_3.23.49-8.11_hppa.deb
stable/main/binary-hppa/mysql-client_3.23.49-8.11_hppa.deb
stable/main/binary-hppa/libmysqlclient10-dev_3.23.49-8.11_hppa.deb
mysql (3.23.49-8.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added important fix digged out by Tom Lane for the patch below that
    will initialise a variable [sql/ha_myisam.cc,
    debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff]


stable/main/binary-alpha/mysql-server_3.23.49-8.11_alpha.deb
stable/main/binary-alpha/libmysqlclient10-dev_3.23.49-8.11_alpha.deb
stable/main/binary-alpha/mysql-client_3.23.49-8.11_alpha.deb
stable/main/binary-alpha/libmysqlclient10_3.23.49-8.11_alpha.deb
mysql (3.23.49-8.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added important fix digged out by Tom Lane for the patch below that
    will initialise a variable [sql/ha_myisam.cc,
    debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff]


stable/main/binary-arm/mysql-client_3.23.49-8.11_arm.deb
stable/main/binary-all/mysql-common_3.23.49-8.11_all.deb
stable/main/binary-arm/libmysqlclient10_3.23.49-8.11_arm.deb
stable/main/source/mysql_3.23.49-8.11.dsc
stable/main/binary-arm/libmysqlclient10-dev_3.23.49-8.11_arm.deb
stable/main/binary-arm/mysql-server_3.23.49-8.11_arm.deb
stable/main/source/mysql_3.23.49-8.11.diff.gz
mysql (3.23.49-8.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added important fix digged out by Tom Lane for the patch below that
    will initialise a variable [sql/ha_myisam.cc,
    debian/patches/SECURITY__CAN-2005-0709,0710,0711.diff]


stable/main/binary-sparc/libmm11-dev_1.1.3-6.3_sparc.deb
stable/main/binary-sparc/libmm11_1.1.3-6.3_sparc.deb
mm (1.1.3-6.3) stable; urgency=low
  * Force the use of System V shared memory instead: it was the more usual
    choice before and many Apache configurations can't cope if the backing
    store for MMFILE gets allocated (closes: #280233, #280871, #282787).
    This reverts the previous change.


stable/main/binary-s390/libmm11_1.1.3-6.3_s390.deb
stable/main/binary-s390/libmm11-dev_1.1.3-6.3_s390.deb
mm (1.1.3-6.3) stable; urgency=low
  * Force the use of System V shared memory instead: it was the more usual
    choice before and many Apache configurations can't cope if the backing
    store for MMFILE gets allocated (closes: #280233, #280871, #282787).
    This reverts the previous change.


stable/main/binary-powerpc/libmm11-dev_1.1.3-6.3_powerpc.deb
stable/main/binary-powerpc/libmm11_1.1.3-6.3_powerpc.deb
mm (1.1.3-6.3) stable; urgency=low
  * Force the use of System V shared memory instead: it was the more usual
    choice before and many Apache configurations can't cope if the backing
    store for MMFILE gets allocated (closes: #280233, #280871, #282787).
    This reverts the previous change.


stable/main/binary-mipsel/libmm11_1.1.3-6.3_mipsel.deb
stable/main/binary-mipsel/libmm11-dev_1.1.3-6.3_mipsel.deb
mm (1.1.3-6.3) stable; urgency=low
  * Force the use of System V shared memory instead: it was the more usual
    choice before and many Apache configurations can't cope if the backing
    store for MMFILE gets allocated (closes: #280233, #280871, #282787).
    This reverts the previous change.


stable/main/binary-mips/libmm11_1.1.3-6.3_mips.deb
stable/main/binary-mips/libmm11-dev_1.1.3-6.3_mips.deb
mm (1.1.3-6.3) stable; urgency=low
  * Force the use of System V shared memory instead: it was the more usual
    choice before and many Apache configurations can't cope if the backing
    store for MMFILE gets allocated (closes: #280233, #280871, #282787).
    This reverts the previous change.


stable/main/binary-m68k/libmm11-dev_1.1.3-6.3_m68k.deb
stable/main/binary-m68k/libmm11_1.1.3-6.3_m68k.deb
mm (1.1.3-6.3) stable; urgency=low
  * Force the use of System V shared memory instead: it was the more usual
    choice before and many Apache configurations can't cope if the backing
    store for MMFILE gets allocated (closes: #280233, #280871, #282787).
    This reverts the previous change.


stable/main/binary-ia64/libmm11_1.1.3-6.3_ia64.deb
stable/main/binary-ia64/libmm11-dev_1.1.3-6.3_ia64.deb
mm (1.1.3-6.3) stable; urgency=low
  * Force the use of System V shared memory instead: it was the more usual
    choice before and many Apache configurations can't cope if the backing
    store for MMFILE gets allocated (closes: #280233, #280871, #282787).
    This reverts the previous change.


stable/main/binary-hppa/libmm11_1.1.3-6.3_hppa.deb
stable/main/binary-hppa/libmm11-dev_1.1.3-6.3_hppa.deb
mm (1.1.3-6.3) stable; urgency=low
  * Force the use of System V shared memory instead: it was the more usual
    choice before and many Apache configurations can't cope if the backing
    store for MMFILE gets allocated (closes: #280233, #280871, #282787).
    This reverts the previous change.


stable/main/binary-arm/libmm11_1.1.3-6.3_arm.deb
stable/main/binary-arm/libmm11-dev_1.1.3-6.3_arm.deb
mm (1.1.3-6.3) stable; urgency=low
  * Force the use of System V shared memory instead: it was the more usual
    choice before and many Apache configurations can't cope if the backing
    store for MMFILE gets allocated (closes: #280233, #280871, #282787).
    This reverts the previous change.


stable/main/binary-alpha/libmm11_1.1.3-6.3_alpha.deb
stable/main/binary-alpha/libmm11-dev_1.1.3-6.3_alpha.deb
mm (1.1.3-6.3) stable; urgency=low
  * Force the use of System V shared memory instead: it was the more usual
    choice before and many Apache configurations can't cope if the backing
    store for MMFILE gets allocated (closes: #280233, #280871, #282787).
    This reverts the previous change.


stable/main/binary-i386/libmm11-dev_1.1.3-6.3_i386.deb
stable/main/source/mm_1.1.3-6.3.dsc
stable/main/binary-i386/libmm11_1.1.3-6.3_i386.deb
stable/main/source/mm_1.1.3-6.3.diff.gz
mm (1.1.3-6.3) stable; urgency=low
  * Force the use of System V shared memory instead: it was the more usual
    choice before and many Apache configurations can't cope if the backing
    store for MMFILE gets allocated (closes: #280233, #280871, #282787).
    This reverts the previous change.


stable/main/binary-sparc/mc_4.5.55-1.2woody6_sparc.deb
stable/main/binary-sparc/mc-common_4.5.55-1.2woody6_sparc.deb
stable/main/binary-sparc/gmc_4.5.55-1.2woody6_sparc.deb
mc (4.5.55-1.2woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Andrew V. Samoilov to fix regression in buffer
    overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366,
    debian/patches/52_security_CAN-2004-0226_fix.diff]
  * Applied patch by Andrew V. Samoilov to fix another buffer overflow
    [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff]


stable/main/binary-s390/mc_4.5.55-1.2woody6_s390.deb
stable/main/binary-s390/mc-common_4.5.55-1.2woody6_s390.deb
stable/main/binary-s390/gmc_4.5.55-1.2woody6_s390.deb
mc (4.5.55-1.2woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Andrew V. Samoilov to fix regression in buffer
    overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366,
    debian/patches/52_security_CAN-2004-0226_fix.diff]
  * Applied patch by Andrew V. Samoilov to fix another buffer overflow
    [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff]


stable/main/binary-powerpc/mc_4.5.55-1.2woody6_powerpc.deb
stable/main/binary-powerpc/gmc_4.5.55-1.2woody6_powerpc.deb
stable/main/binary-powerpc/mc-common_4.5.55-1.2woody6_powerpc.deb
mc (4.5.55-1.2woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Andrew V. Samoilov to fix regression in buffer
    overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366,
    debian/patches/52_security_CAN-2004-0226_fix.diff]
  * Applied patch by Andrew V. Samoilov to fix another buffer overflow
    [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff]


stable/main/binary-mipsel/mc-common_4.5.55-1.2woody6_mipsel.deb
stable/main/binary-mipsel/mc_4.5.55-1.2woody6_mipsel.deb
stable/main/binary-mipsel/gmc_4.5.55-1.2woody6_mipsel.deb
mc (4.5.55-1.2woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Andrew V. Samoilov to fix regression in buffer
    overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366,
    debian/patches/52_security_CAN-2004-0226_fix.diff]
  * Applied patch by Andrew V. Samoilov to fix another buffer overflow
    [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff]


stable/main/binary-mips/mc_4.5.55-1.2woody6_mips.deb
stable/main/binary-mips/gmc_4.5.55-1.2woody6_mips.deb
stable/main/binary-mips/mc-common_4.5.55-1.2woody6_mips.deb
mc (4.5.55-1.2woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Andrew V. Samoilov to fix regression in buffer
    overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366,
    debian/patches/52_security_CAN-2004-0226_fix.diff]
  * Applied patch by Andrew V. Samoilov to fix another buffer overflow
    [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff]


stable/main/binary-m68k/gmc_4.5.55-1.2woody6_m68k.deb
stable/main/binary-m68k/mc_4.5.55-1.2woody6_m68k.deb
stable/main/binary-m68k/mc-common_4.5.55-1.2woody6_m68k.deb
mc (4.5.55-1.2woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Andrew V. Samoilov to fix regression in buffer
    overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366,
    debian/patches/52_security_CAN-2004-0226_fix.diff]
  * Applied patch by Andrew V. Samoilov to fix another buffer overflow
    [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff]


stable/main/binary-ia64/mc-common_4.5.55-1.2woody6_ia64.deb
stable/main/binary-ia64/gmc_4.5.55-1.2woody6_ia64.deb
stable/main/binary-ia64/mc_4.5.55-1.2woody6_ia64.deb
mc (4.5.55-1.2woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Andrew V. Samoilov to fix regression in buffer
    overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366,
    debian/patches/52_security_CAN-2004-0226_fix.diff]
  * Applied patch by Andrew V. Samoilov to fix another buffer overflow
    [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff]


stable/main/binary-i386/mc-common_4.5.55-1.2woody6_i386.deb
stable/main/binary-i386/gmc_4.5.55-1.2woody6_i386.deb
stable/main/binary-i386/mc_4.5.55-1.2woody6_i386.deb
mc (4.5.55-1.2woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Andrew V. Samoilov to fix regression in buffer
    overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366,
    debian/patches/52_security_CAN-2004-0226_fix.diff]
  * Applied patch by Andrew V. Samoilov to fix another buffer overflow
    [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff]


stable/main/binary-hppa/mc_4.5.55-1.2woody6_hppa.deb
stable/main/binary-hppa/mc-common_4.5.55-1.2woody6_hppa.deb
stable/main/binary-hppa/gmc_4.5.55-1.2woody6_hppa.deb
mc (4.5.55-1.2woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Andrew V. Samoilov to fix regression in buffer
    overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366,
    debian/patches/52_security_CAN-2004-0226_fix.diff]
  * Applied patch by Andrew V. Samoilov to fix another buffer overflow
    [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff]


stable/main/binary-alpha/gmc_4.5.55-1.2woody6_alpha.deb
stable/main/binary-alpha/mc_4.5.55-1.2woody6_alpha.deb
stable/main/binary-alpha/mc-common_4.5.55-1.2woody6_alpha.deb
mc (4.5.55-1.2woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Andrew V. Samoilov to fix regression in buffer
    overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366,
    debian/patches/52_security_CAN-2004-0226_fix.diff]
  * Applied patch by Andrew V. Samoilov to fix another buffer overflow
    [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff]


stable/main/binary-arm/mc_4.5.55-1.2woody6_arm.deb
stable/main/binary-arm/mc-common_4.5.55-1.2woody6_arm.deb
stable/main/source/mc_4.5.55-1.2woody6.dsc
stable/main/binary-arm/gmc_4.5.55-1.2woody6_arm.deb
stable/main/source/mc_4.5.55-1.2woody6.diff.gz
mc (4.5.55-1.2woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Andrew V. Samoilov to fix regression in buffer
    overflow patch [src/complete.c, CAN-2004-0226, Bug#246943, Bug#249366,
    debian/patches/52_security_CAN-2004-0226_fix.diff]
  * Applied patch by Andrew V. Samoilov to fix another buffer overflow
    [src/complete.c, debian/patches/52_security_CAN-2005-0763.diff]


stable/main/binary-sparc/mailman_2.0.11-1woody11_sparc.deb
mailman (2.0.11-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will
    work with Python 1.5 as well since that's the lowest requirement for
    mailman in Debian/stable and since Python 1.5.2 doesn't do list
    comprehensions [Mailman/Cgi/private.py]


stable/main/binary-s390/mailman_2.0.11-1woody11_s390.deb
mailman (2.0.11-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will
    work with Python 1.5 as well since that's the lowest requirement for
    mailman in Debian/stable and since Python 1.5.2 doesn't do list
    comprehensions [Mailman/Cgi/private.py]


stable/main/binary-powerpc/mailman_2.0.11-1woody11_powerpc.deb
mailman (2.0.11-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will
    work with Python 1.5 as well since that's the lowest requirement for
    mailman in Debian/stable and since Python 1.5.2 doesn't do list
    comprehensions [Mailman/Cgi/private.py]


stable/main/binary-mips/mailman_2.0.11-1woody11_mips.deb
mailman (2.0.11-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will
    work with Python 1.5 as well since that's the lowest requirement for
    mailman in Debian/stable and since Python 1.5.2 doesn't do list
    comprehensions [Mailman/Cgi/private.py]


stable/main/binary-m68k/mailman_2.0.11-1woody11_m68k.deb
mailman (2.0.11-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will
    work with Python 1.5 as well since that's the lowest requirement for
    mailman in Debian/stable and since Python 1.5.2 doesn't do list
    comprehensions [Mailman/Cgi/private.py]


stable/main/binary-ia64/mailman_2.0.11-1woody11_ia64.deb
mailman (2.0.11-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will
    work with Python 1.5 as well since that's the lowest requirement for
    mailman in Debian/stable and since Python 1.5.2 doesn't do list
    comprehensions [Mailman/Cgi/private.py]


stable/main/binary-i386/mailman_2.0.11-1woody11_i386.deb
mailman (2.0.11-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will
    work with Python 1.5 as well since that's the lowest requirement for
    mailman in Debian/stable and since Python 1.5.2 doesn't do list
    comprehensions [Mailman/Cgi/private.py]


stable/main/binary-hppa/mailman_2.0.11-1woody11_hppa.deb
mailman (2.0.11-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will
    work with Python 1.5 as well since that's the lowest requirement for
    mailman in Debian/stable and since Python 1.5.2 doesn't do list
    comprehensions [Mailman/Cgi/private.py]


stable/main/binary-arm/mailman_2.0.11-1woody11_arm.deb
mailman (2.0.11-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will
    work with Python 1.5 as well since that's the lowest requirement for
    mailman in Debian/stable and since Python 1.5.2 doesn't do list
    comprehensions [Mailman/Cgi/private.py]


stable/main/binary-alpha/mailman_2.0.11-1woody11_alpha.deb
mailman (2.0.11-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will
    work with Python 1.5 as well since that's the lowest requirement for
    mailman in Debian/stable and since Python 1.5.2 doesn't do list
    comprehensions [Mailman/Cgi/private.py]


stable/main/binary-mipsel/mailman_2.0.11-1woody11_mipsel.deb
stable/main/source/mailman_2.0.11-1woody11.diff.gz
stable/main/source/mailman_2.0.11-1woody11.dsc
mailman (2.0.11-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rewrote patch to fix directory traversal (CAN-2005-0202) so it will
    work with Python 1.5 as well since that's the lowest requirement for
    mailman in Debian/stable and since Python 1.5.2 doesn't do list
    comprehensions [Mailman/Cgi/private.py]


stable/main/binary-i386/luxman_0.41-17.2_i386.deb
stable/main/source/luxman_0.41-17.2.dsc
stable/main/source/luxman_0.41-17.2.diff.gz
luxman (0.41-17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Steve Kemp to fix buffer overflow that can lead to a
    local root exploit [gtools/util.cc, CAN-2005-0385]


stable/main/binary-all/lintian_1.20.17.1_all.deb
stable/main/source/lintian_1.20.17.1.dsc
stable/main/source/lintian_1.20.17.1.tar.gz
lintian (1.20.17.1) stable-security; urgency=high
  * New-Maintainer upload for the Security Team
  * Fix insecure removal of files if lintian failed to create a temporary lab
    [frontend/lintian, CAN-2004-1000] (Closes: #286681)


stable/main/binary-sparc/linpopup_1.2.0-2woody1_sparc.deb
linpopup (1.2.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Fixed buffer overflow in string expansion.
    [string.c, CAN-2004-1282]


stable/main/binary-s390/linpopup_1.2.0-2woody1_s390.deb
linpopup (1.2.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Fixed buffer overflow in string expansion.
    [string.c, CAN-2004-1282]


stable/main/binary-powerpc/linpopup_1.2.0-2woody1_powerpc.deb
linpopup (1.2.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Fixed buffer overflow in string expansion.
    [string.c, CAN-2004-1282]


stable/main/binary-mipsel/linpopup_1.2.0-2woody1_mipsel.deb
linpopup (1.2.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Fixed buffer overflow in string expansion.
    [string.c, CAN-2004-1282]


stable/main/binary-mips/linpopup_1.2.0-2woody1_mips.deb
linpopup (1.2.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Fixed buffer overflow in string expansion.
    [string.c, CAN-2004-1282]


stable/main/binary-m68k/linpopup_1.2.0-2woody1_m68k.deb
linpopup (1.2.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Fixed buffer overflow in string expansion.
    [string.c, CAN-2004-1282]


stable/main/binary-ia64/linpopup_1.2.0-2woody1_ia64.deb
linpopup (1.2.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Fixed buffer overflow in string expansion.
    [string.c, CAN-2004-1282]


stable/main/binary-hppa/linpopup_1.2.0-2woody1_hppa.deb
linpopup (1.2.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Fixed buffer overflow in string expansion.
    [string.c, CAN-2004-1282]


stable/main/binary-arm/linpopup_1.2.0-2woody1_arm.deb
linpopup (1.2.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Fixed buffer overflow in string expansion.
    [string.c, CAN-2004-1282]


stable/main/binary-alpha/linpopup_1.2.0-2woody1_alpha.deb
linpopup (1.2.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Fixed buffer overflow in string expansion.
    [string.c, CAN-2004-1282]


stable/main/source/linpopup_1.2.0-2woody1.diff.gz
stable/main/binary-i386/linpopup_1.2.0-2woody1_i386.deb
stable/main/source/linpopup_1.2.0-2woody1.dsc
linpopup (1.2.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Fixed buffer overflow in string expansion.
    [string.c, CAN-2004-1282]


stable/main/binary-sparc/libpam-radius-auth_1.3.14-1.3_sparc.deb
libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix
    information leak [debian/preinst, debian/rules, CAN-2004-1340]
  * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108]


stable/main/binary-s390/libpam-radius-auth_1.3.14-1.3_s390.deb
libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix
    information leak [debian/preinst, debian/rules, CAN-2004-1340]
  * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108]


stable/main/binary-powerpc/libpam-radius-auth_1.3.14-1.3_powerpc.deb
libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix
    information leak [debian/preinst, debian/rules, CAN-2004-1340]
  * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108]


stable/main/binary-mips/libpam-radius-auth_1.3.14-1.3_mips.deb
libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix
    information leak [debian/preinst, debian/rules, CAN-2004-1340]
  * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108]


stable/main/binary-m68k/libpam-radius-auth_1.3.14-1.3_m68k.deb
libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix
    information leak [debian/preinst, debian/rules, CAN-2004-1340]
  * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108]


stable/main/binary-ia64/libpam-radius-auth_1.3.14-1.3_ia64.deb
libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix
    information leak [debian/preinst, debian/rules, CAN-2004-1340]
  * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108]


stable/main/binary-i386/libpam-radius-auth_1.3.14-1.3_i386.deb
libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix
    information leak [debian/preinst, debian/rules, CAN-2004-1340]
  * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108]


stable/main/binary-hppa/libpam-radius-auth_1.3.14-1.3_hppa.deb
libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix
    information leak [debian/preinst, debian/rules, CAN-2004-1340]
  * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108]


stable/main/binary-arm/libpam-radius-auth_1.3.14-1.3_arm.deb
libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix
    information leak [debian/preinst, debian/rules, CAN-2004-1340]
  * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108]


stable/main/binary-alpha/libpam-radius-auth_1.3.14-1.3_alpha.deb
libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix
    information leak [debian/preinst, debian/rules, CAN-2004-1340]
  * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108]


stable/main/source/libpam-radius-auth_1.3.14-1.3.diff.gz
stable/main/binary-mipsel/libpam-radius-auth_1.3.14-1.3_mipsel.deb
stable/main/source/libpam-radius-auth_1.3.14-1.3.dsc
libpam-radius-auth (1.3.14-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changed the permissions of /etc/pam_radius_auth.conf to 600 to fix
    information leak [debian/preinst, debian/rules, CAN-2004-1340]
  * Fixed an integer underflow [pam_radius_auth.c, CAN-2005-0108]


stable/main/binary-sparc/libgd-noxpm-dev_1.8.4-17.woody4_sparc.deb
stable/main/binary-sparc/libgd1_1.8.4-17.woody4_sparc.deb
stable/main/binary-sparc/libgd1-noxpm_1.8.4-17.woody4_sparc.deb
stable/main/binary-sparc/libgd-dev_1.8.4-17.woody4_sparc.deb
libgd (1.8.4-17.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]


stable/main/binary-s390/libgd1-noxpm_1.8.4-17.woody4_s390.deb
stable/main/binary-s390/libgd-dev_1.8.4-17.woody4_s390.deb
stable/main/binary-s390/libgd1_1.8.4-17.woody4_s390.deb
stable/main/binary-s390/libgd-noxpm-dev_1.8.4-17.woody4_s390.deb
libgd (1.8.4-17.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]


stable/main/binary-powerpc/libgd1-noxpm_1.8.4-17.woody4_powerpc.deb
stable/main/binary-powerpc/libgd-noxpm-dev_1.8.4-17.woody4_powerpc.deb
stable/main/binary-powerpc/libgd1_1.8.4-17.woody4_powerpc.deb
stable/main/binary-powerpc/libgd-dev_1.8.4-17.woody4_powerpc.deb
libgd (1.8.4-17.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]


stable/main/binary-mips/libgd1-noxpm_1.8.4-17.woody4_mips.deb
stable/main/binary-mips/libgd1_1.8.4-17.woody4_mips.deb
stable/main/binary-mips/libgd-noxpm-dev_1.8.4-17.woody4_mips.deb
stable/main/binary-mips/libgd-dev_1.8.4-17.woody4_mips.deb
libgd (1.8.4-17.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]


stable/main/binary-m68k/libgd1_1.8.4-17.woody4_m68k.deb
stable/main/binary-m68k/libgd-dev_1.8.4-17.woody4_m68k.deb
stable/main/binary-m68k/libgd1-noxpm_1.8.4-17.woody4_m68k.deb
stable/main/binary-m68k/libgd-noxpm-dev_1.8.4-17.woody4_m68k.deb
libgd (1.8.4-17.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]


stable/main/binary-ia64/libgd-dev_1.8.4-17.woody4_ia64.deb
stable/main/binary-ia64/libgd1-noxpm_1.8.4-17.woody4_ia64.deb
stable/main/binary-ia64/libgd1_1.8.4-17.woody4_ia64.deb
stable/main/binary-ia64/libgd-noxpm-dev_1.8.4-17.woody4_ia64.deb
libgd (1.8.4-17.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]


stable/main/binary-i386/libgd-noxpm-dev_1.8.4-17.woody4_i386.deb
stable/main/binary-i386/libgd-dev_1.8.4-17.woody4_i386.deb
stable/main/binary-i386/libgd1_1.8.4-17.woody4_i386.deb
stable/main/binary-i386/libgd1-noxpm_1.8.4-17.woody4_i386.deb
libgd (1.8.4-17.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]


stable/main/binary-hppa/libgd-noxpm-dev_1.8.4-17.woody4_hppa.deb
stable/main/binary-hppa/libgd-dev_1.8.4-17.woody4_hppa.deb
stable/main/binary-hppa/libgd1-noxpm_1.8.4-17.woody4_hppa.deb
stable/main/binary-hppa/libgd1_1.8.4-17.woody4_hppa.deb
libgd (1.8.4-17.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]


stable/main/binary-arm/libgd1_1.8.4-17.woody4_arm.deb
stable/main/binary-arm/libgd-noxpm-dev_1.8.4-17.woody4_arm.deb
stable/main/binary-arm/libgd-dev_1.8.4-17.woody4_arm.deb
stable/main/binary-arm/libgd1-noxpm_1.8.4-17.woody4_arm.deb
libgd (1.8.4-17.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]


stable/main/binary-alpha/libgd1_1.8.4-17.woody4_alpha.deb
stable/main/binary-alpha/libgd-noxpm-dev_1.8.4-17.woody4_alpha.deb
stable/main/binary-alpha/libgd1-noxpm_1.8.4-17.woody4_alpha.deb
stable/main/binary-alpha/libgd-dev_1.8.4-17.woody4_alpha.deb
libgd (1.8.4-17.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]


stable/main/binary-mipsel/libgd-noxpm-dev_1.8.4-17.woody4_mipsel.deb
stable/main/binary-mipsel/libgd-dev_1.8.4-17.woody4_mipsel.deb
stable/main/binary-mipsel/libgd1-noxpm_1.8.4-17.woody4_mipsel.deb
stable/main/source/libgd_1.8.4-17.woody4.diff.gz
stable/main/binary-mipsel/libgd1_1.8.4-17.woody4_mipsel.deb
stable/main/source/libgd_1.8.4-17.woody4.dsc
libgd (1.8.4-17.woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]


stable/main/binary-sparc/libdbi-perl_1.21-2woody2_sparc.deb
libdbi-perl (1.21-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Javier Fernández-Sanguino Peña to not create an
    insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm,
    CAN-2005-0077]


stable/main/binary-s390/libdbi-perl_1.21-2woody2_s390.deb
libdbi-perl (1.21-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Javier Fernández-Sanguino Peña to not create an
    insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm,
    CAN-2005-0077]


stable/main/binary-powerpc/libdbi-perl_1.21-2woody2_powerpc.deb
libdbi-perl (1.21-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Javier Fernández-Sanguino Peña to not create an
    insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm,
    CAN-2005-0077]


stable/main/binary-mips/libdbi-perl_1.21-2woody2_mips.deb
libdbi-perl (1.21-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Javier Fernández-Sanguino Peña to not create an
    insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm,
    CAN-2005-0077]


stable/main/binary-m68k/libdbi-perl_1.21-2woody2_m68k.deb
libdbi-perl (1.21-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Javier Fernández-Sanguino Peña to not create an
    insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm,
    CAN-2005-0077]


stable/main/binary-ia64/libdbi-perl_1.21-2woody2_ia64.deb
libdbi-perl (1.21-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Javier Fernández-Sanguino Peña to not create an
    insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm,
    CAN-2005-0077]


stable/main/binary-i386/libdbi-perl_1.21-2woody2_i386.deb
libdbi-perl (1.21-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Javier Fernández-Sanguino Peña to not create an
    insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm,
    CAN-2005-0077]


stable/main/binary-hppa/libdbi-perl_1.21-2woody2_hppa.deb
libdbi-perl (1.21-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Javier Fernández-Sanguino Peña to not create an
    insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm,
    CAN-2005-0077]


stable/main/binary-arm/libdbi-perl_1.21-2woody2_arm.deb
libdbi-perl (1.21-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Javier Fernández-Sanguino Peña to not create an
    insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm,
    CAN-2005-0077]


stable/main/binary-alpha/libdbi-perl_1.21-2woody2_alpha.deb
libdbi-perl (1.21-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Javier Fernández-Sanguino Peña to not create an
    insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm,
    CAN-2005-0077]


stable/main/source/libdbi-perl_1.21-2woody2.diff.gz
stable/main/binary-mipsel/libdbi-perl_1.21-2woody2_mipsel.deb
stable/main/source/libdbi-perl_1.21-2woody2.dsc
libdbi-perl (1.21-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Javier Fernández-Sanguino Peña to not create an
    insecure temporary file anymore [dbiproxy.PL, lib/DBI/ProxyServer.pm,
    CAN-2005-0077]


stable/main/binary-sparc/libapache-mod-python_2.7.8-0.0woody5_sparc.deb
libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload because I can't get wanna-build to accept the fact
    that the buildd hasn't uploaded it since the files were empty due to
    klecker being out of space.


stable/main/binary-s390/libapache-mod-python_2.7.8-0.0woody5_s390.deb
libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload because I can't get wanna-build to accept the fact
    that the buildd hasn't uploaded it since the files were empty due to
    klecker being out of space.


stable/main/binary-powerpc/libapache-mod-python_2.7.8-0.0woody5_powerpc.deb
libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload because I can't get wanna-build to accept the fact
    that the buildd hasn't uploaded it since the files were empty due to
    klecker being out of space.


stable/main/binary-mips/libapache-mod-python_2.7.8-0.0woody5_mips.deb
libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload because I can't get wanna-build to accept the fact
    that the buildd hasn't uploaded it since the files were empty due to
    klecker being out of space.


stable/main/binary-m68k/libapache-mod-python_2.7.8-0.0woody5_m68k.deb
libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload because I can't get wanna-build to accept the fact
    that the buildd hasn't uploaded it since the files were empty due to
    klecker being out of space.


stable/main/binary-ia64/libapache-mod-python_2.7.8-0.0woody5_ia64.deb
libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload because I can't get wanna-build to accept the fact
    that the buildd hasn't uploaded it since the files were empty due to
    klecker being out of space.


stable/main/binary-i386/libapache-mod-python_2.7.8-0.0woody5_i386.deb
libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload because I can't get wanna-build to accept the fact
    that the buildd hasn't uploaded it since the files were empty due to
    klecker being out of space.


stable/main/binary-hppa/libapache-mod-python_2.7.8-0.0woody5_hppa.deb
libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload because I can't get wanna-build to accept the fact
    that the buildd hasn't uploaded it since the files were empty due to
    klecker being out of space.


stable/main/binary-arm/libapache-mod-python_2.7.8-0.0woody5_arm.deb
libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload because I can't get wanna-build to accept the fact
    that the buildd hasn't uploaded it since the files were empty due to
    klecker being out of space.


stable/main/binary-alpha/libapache-mod-python_2.7.8-0.0woody5_alpha.deb
libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload because I can't get wanna-build to accept the fact
    that the buildd hasn't uploaded it since the files were empty due to
    klecker being out of space.


stable/main/source/libapache-mod-python_2.7.8-0.0woody5.diff.gz
stable/main/binary-mipsel/libapache-mod-python_2.7.8-0.0woody5_mipsel.deb
stable/main/source/libapache-mod-python_2.7.8-0.0woody5.dsc
libapache-mod-python (2:2.7.8-0.0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * No-changes upload because I can't get wanna-build to accept the fact
    that the buildd hasn't uploaded it since the files were empty due to
    klecker being out of space.


stable/main/binary-sparc/krb5-rsh-server_1.2.4-5woody8_sparc.deb
stable/main/binary-sparc/krb5-user_1.2.4-5woody8_sparc.deb
stable/main/binary-sparc/krb5-admin-server_1.2.4-5woody8_sparc.deb
stable/main/binary-sparc/libkrb5-dev_1.2.4-5woody8_sparc.deb
stable/main/binary-sparc/krb5-clients_1.2.4-5woody8_sparc.deb
stable/main/binary-sparc/krb5-kdc_1.2.4-5woody8_sparc.deb
stable/main/binary-sparc/krb5-ftpd_1.2.4-5woody8_sparc.deb
stable/main/binary-sparc/krb5-telnetd_1.2.4-5woody8_sparc.deb
stable/main/binary-sparc/libkrb53_1.2.4-5woody8_sparc.deb
stable/main/binary-sparc/libkadm55_1.2.4-5woody8_sparc.deb
krb5 (1.2.4-5woody8) stable-security; urgency=low
  * Fixbuffer overflow in slc_add_reply  in telnet.c (CAN-2005-0469)
  * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 )
  * Note that  both of these vulnerabilities are client-side
    vulnerabilities that can be exploited only by a server.


stable/main/binary-s390/krb5-rsh-server_1.2.4-5woody8_s390.deb
stable/main/binary-s390/libkrb53_1.2.4-5woody8_s390.deb
stable/main/binary-s390/libkadm55_1.2.4-5woody8_s390.deb
stable/main/binary-s390/krb5-telnetd_1.2.4-5woody8_s390.deb
stable/main/binary-s390/krb5-admin-server_1.2.4-5woody8_s390.deb
stable/main/binary-s390/krb5-user_1.2.4-5woody8_s390.deb
stable/main/binary-s390/krb5-clients_1.2.4-5woody8_s390.deb
stable/main/binary-s390/libkrb5-dev_1.2.4-5woody8_s390.deb
stable/main/binary-s390/krb5-kdc_1.2.4-5woody8_s390.deb
stable/main/binary-s390/krb5-ftpd_1.2.4-5woody8_s390.deb
krb5 (1.2.4-5woody8) stable-security; urgency=low
  * Fixbuffer overflow in slc_add_reply  in telnet.c (CAN-2005-0469)
  * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 )
  * Note that  both of these vulnerabilities are client-side
    vulnerabilities that can be exploited only by a server.


stable/main/binary-powerpc/libkadm55_1.2.4-5woody8_powerpc.deb
stable/main/binary-powerpc/krb5-admin-server_1.2.4-5woody8_powerpc.deb
stable/main/binary-powerpc/krb5-telnetd_1.2.4-5woody8_powerpc.deb
stable/main/binary-powerpc/krb5-clients_1.2.4-5woody8_powerpc.deb
stable/main/binary-powerpc/krb5-user_1.2.4-5woody8_powerpc.deb
stable/main/binary-powerpc/libkrb5-dev_1.2.4-5woody8_powerpc.deb
stable/main/binary-powerpc/krb5-rsh-server_1.2.4-5woody8_powerpc.deb
stable/main/binary-powerpc/krb5-ftpd_1.2.4-5woody8_powerpc.deb
stable/main/binary-powerpc/krb5-kdc_1.2.4-5woody8_powerpc.deb
stable/main/binary-powerpc/libkrb53_1.2.4-5woody8_powerpc.deb
krb5 (1.2.4-5woody8) stable-security; urgency=low
  * Fixbuffer overflow in slc_add_reply  in telnet.c (CAN-2005-0469)
  * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 )
  * Note that  both of these vulnerabilities are client-side
    vulnerabilities that can be exploited only by a server.


stable/main/binary-mipsel/libkrb53_1.2.4-5woody8_mipsel.deb
stable/main/binary-mipsel/krb5-clients_1.2.4-5woody8_mipsel.deb
stable/main/binary-mipsel/krb5-rsh-server_1.2.4-5woody8_mipsel.deb
stable/main/binary-mipsel/krb5-admin-server_1.2.4-5woody8_mipsel.deb
stable/main/binary-mipsel/krb5-ftpd_1.2.4-5woody8_mipsel.deb
stable/main/binary-mipsel/krb5-user_1.2.4-5woody8_mipsel.deb
stable/main/binary-mipsel/krb5-telnetd_1.2.4-5woody8_mipsel.deb
stable/main/binary-mipsel/krb5-kdc_1.2.4-5woody8_mipsel.deb
stable/main/binary-mipsel/libkrb5-dev_1.2.4-5woody8_mipsel.deb
stable/main/binary-mipsel/libkadm55_1.2.4-5woody8_mipsel.deb
krb5 (1.2.4-5woody8) stable-security; urgency=low
  * Fixbuffer overflow in slc_add_reply  in telnet.c (CAN-2005-0469)
  * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 )
  * Note that  both of these vulnerabilities are client-side
    vulnerabilities that can be exploited only by a server.


stable/main/binary-mips/libkadm55_1.2.4-5woody8_mips.deb
stable/main/binary-mips/krb5-telnetd_1.2.4-5woody8_mips.deb
stable/main/binary-mips/krb5-user_1.2.4-5woody8_mips.deb
stable/main/binary-mips/krb5-clients_1.2.4-5woody8_mips.deb
stable/main/binary-mips/libkrb5-dev_1.2.4-5woody8_mips.deb
stable/main/binary-mips/krb5-ftpd_1.2.4-5woody8_mips.deb
stable/main/binary-mips/krb5-rsh-server_1.2.4-5woody8_mips.deb
stable/main/binary-mips/libkrb53_1.2.4-5woody8_mips.deb
stable/main/binary-mips/krb5-admin-server_1.2.4-5woody8_mips.deb
stable/main/binary-mips/krb5-kdc_1.2.4-5woody8_mips.deb
krb5 (1.2.4-5woody8) stable-security; urgency=low
  * Fixbuffer overflow in slc_add_reply  in telnet.c (CAN-2005-0469)
  * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 )
  * Note that  both of these vulnerabilities are client-side
    vulnerabilities that can be exploited only by a server.


stable/main/binary-m68k/krb5-kdc_1.2.4-5woody8_m68k.deb
stable/main/binary-m68k/libkadm55_1.2.4-5woody8_m68k.deb
stable/main/binary-m68k/krb5-user_1.2.4-5woody8_m68k.deb
stable/main/binary-m68k/libkrb53_1.2.4-5woody8_m68k.deb
stable/main/binary-m68k/krb5-rsh-server_1.2.4-5woody8_m68k.deb
stable/main/binary-m68k/krb5-ftpd_1.2.4-5woody8_m68k.deb
stable/main/binary-m68k/libkrb5-dev_1.2.4-5woody8_m68k.deb
stable/main/binary-m68k/krb5-admin-server_1.2.4-5woody8_m68k.deb
stable/main/binary-m68k/krb5-clients_1.2.4-5woody8_m68k.deb
stable/main/binary-m68k/krb5-telnetd_1.2.4-5woody8_m68k.deb
krb5 (1.2.4-5woody8) stable-security; urgency=low
  * Fixbuffer overflow in slc_add_reply  in telnet.c (CAN-2005-0469)
  * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 )
  * Note that  both of these vulnerabilities are client-side
    vulnerabilities that can be exploited only by a server.


stable/main/binary-ia64/libkrb53_1.2.4-5woody8_ia64.deb
stable/main/binary-ia64/krb5-rsh-server_1.2.4-5woody8_ia64.deb
stable/main/binary-ia64/libkadm55_1.2.4-5woody8_ia64.deb
stable/main/binary-ia64/krb5-admin-server_1.2.4-5woody8_ia64.deb
stable/main/binary-ia64/libkrb5-dev_1.2.4-5woody8_ia64.deb
stable/main/binary-ia64/krb5-clients_1.2.4-5woody8_ia64.deb
stable/main/binary-ia64/krb5-ftpd_1.2.4-5woody8_ia64.deb
stable/main/binary-ia64/krb5-user_1.2.4-5woody8_ia64.deb
stable/main/binary-ia64/krb5-kdc_1.2.4-5woody8_ia64.deb
stable/main/binary-ia64/krb5-telnetd_1.2.4-5woody8_ia64.deb
krb5 (1.2.4-5woody8) stable-security; urgency=low
  * Fixbuffer overflow in slc_add_reply  in telnet.c (CAN-2005-0469)
  * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 )
  * Note that  both of these vulnerabilities are client-side
    vulnerabilities that can be exploited only by a server.


stable/main/binary-hppa/libkadm55_1.2.4-5woody8_hppa.deb
stable/main/binary-hppa/libkrb53_1.2.4-5woody8_hppa.deb
stable/main/binary-hppa/krb5-ftpd_1.2.4-5woody8_hppa.deb
stable/main/binary-hppa/krb5-rsh-server_1.2.4-5woody8_hppa.deb
stable/main/binary-hppa/krb5-admin-server_1.2.4-5woody8_hppa.deb
stable/main/binary-hppa/krb5-clients_1.2.4-5woody8_hppa.deb
stable/main/binary-hppa/krb5-user_1.2.4-5woody8_hppa.deb
stable/main/binary-hppa/krb5-kdc_1.2.4-5woody8_hppa.deb
stable/main/binary-hppa/libkrb5-dev_1.2.4-5woody8_hppa.deb
stable/main/binary-hppa/krb5-telnetd_1.2.4-5woody8_hppa.deb
krb5 (1.2.4-5woody8) stable-security; urgency=low
  * Fixbuffer overflow in slc_add_reply  in telnet.c (CAN-2005-0469)
  * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 )
  * Note that  both of these vulnerabilities are client-side
    vulnerabilities that can be exploited only by a server.


stable/main/binary-arm/krb5-kdc_1.2.4-5woody8_arm.deb
stable/main/binary-arm/libkrb5-dev_1.2.4-5woody8_arm.deb
stable/main/binary-arm/krb5-clients_1.2.4-5woody8_arm.deb
stable/main/binary-arm/libkadm55_1.2.4-5woody8_arm.deb
stable/main/binary-arm/krb5-telnetd_1.2.4-5woody8_arm.deb
stable/main/binary-arm/krb5-rsh-server_1.2.4-5woody8_arm.deb
stable/main/binary-arm/krb5-ftpd_1.2.4-5woody8_arm.deb
stable/main/binary-arm/krb5-user_1.2.4-5woody8_arm.deb
stable/main/binary-arm/krb5-admin-server_1.2.4-5woody8_arm.deb
stable/main/binary-arm/libkrb53_1.2.4-5woody8_arm.deb
krb5 (1.2.4-5woody8) stable-security; urgency=low
  * Fixbuffer overflow in slc_add_reply  in telnet.c (CAN-2005-0469)
  * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 )
  * Note that  both of these vulnerabilities are client-side
    vulnerabilities that can be exploited only by a server.


stable/main/binary-alpha/krb5-user_1.2.4-5woody8_alpha.deb
stable/main/binary-alpha/libkrb5-dev_1.2.4-5woody8_alpha.deb
stable/main/binary-alpha/krb5-telnetd_1.2.4-5woody8_alpha.deb
stable/main/binary-alpha/krb5-ftpd_1.2.4-5woody8_alpha.deb
stable/main/binary-alpha/libkrb53_1.2.4-5woody8_alpha.deb
stable/main/binary-alpha/krb5-clients_1.2.4-5woody8_alpha.deb
stable/main/binary-alpha/krb5-kdc_1.2.4-5woody8_alpha.deb
stable/main/binary-alpha/krb5-rsh-server_1.2.4-5woody8_alpha.deb
stable/main/binary-alpha/libkadm55_1.2.4-5woody8_alpha.deb
stable/main/binary-alpha/krb5-admin-server_1.2.4-5woody8_alpha.deb
krb5 (1.2.4-5woody8) stable-security; urgency=low
  * Fixbuffer overflow in slc_add_reply  in telnet.c (CAN-2005-0469)
  * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 )
  * Note that  both of these vulnerabilities are client-side
    vulnerabilities that can be exploited only by a server.


stable/main/binary-i386/krb5-telnetd_1.2.4-5woody8_i386.deb
stable/main/binary-i386/krb5-ftpd_1.2.4-5woody8_i386.deb
stable/main/source/krb5_1.2.4-5woody8.diff.gz
stable/main/binary-i386/libkrb5-dev_1.2.4-5woody8_i386.deb
stable/main/binary-i386/krb5-admin-server_1.2.4-5woody8_i386.deb
stable/main/binary-i386/libkrb53_1.2.4-5woody8_i386.deb
stable/main/binary-i386/krb5-kdc_1.2.4-5woody8_i386.deb
stable/main/binary-i386/libkadm55_1.2.4-5woody8_i386.deb
stable/main/binary-i386/krb5-clients_1.2.4-5woody8_i386.deb
stable/main/binary-i386/krb5-user_1.2.4-5woody8_i386.deb
stable/main/binary-i386/krb5-rsh-server_1.2.4-5woody8_i386.deb
stable/main/source/krb5_1.2.4-5woody8.dsc
stable/main/binary-all/krb5-doc_1.2.4-5woody8_all.deb
krb5 (1.2.4-5woody8) stable-security; urgency=low
  * Fixbuffer overflow in slc_add_reply  in telnet.c (CAN-2005-0469)
  * Fix telnet.c env_opt_add buffer overflow (CAN-2005-0468 )
  * Note that  both of these vulnerabilities are client-side
    vulnerabilities that can be exploited only by a server.


stable/main/binary-sparc/libkdenetwork1_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/ktalkd_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/knewsticker_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/kmail_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/kppp_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/kdict_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/libmimelib-dev_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/kit_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/korn_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/ksirc_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/klisa_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/libmimelib1_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/knode_2.2.2-14.7_sparc.deb
kdenetwork (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Dirk Müller to fix file descriptor leak
    [kppp/main.cpp, CAN-2005-0205]


stable/main/binary-s390/kmail_2.2.2-14.7_s390.deb
stable/main/binary-s390/libmimelib1_2.2.2-14.7_s390.deb
stable/main/binary-s390/kppp_2.2.2-14.7_s390.deb
stable/main/binary-s390/libkdenetwork1_2.2.2-14.7_s390.deb
stable/main/binary-s390/ktalkd_2.2.2-14.7_s390.deb
stable/main/binary-s390/korn_2.2.2-14.7_s390.deb
stable/main/binary-s390/knode_2.2.2-14.7_s390.deb
stable/main/binary-s390/kit_2.2.2-14.7_s390.deb
stable/main/binary-s390/kdict_2.2.2-14.7_s390.deb
stable/main/binary-s390/ksirc_2.2.2-14.7_s390.deb
stable/main/binary-s390/libmimelib-dev_2.2.2-14.7_s390.deb
stable/main/binary-s390/knewsticker_2.2.2-14.7_s390.deb
stable/main/binary-s390/klisa_2.2.2-14.7_s390.deb
kdenetwork (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Dirk Müller to fix file descriptor leak
    [kppp/main.cpp, CAN-2005-0205]


stable/main/binary-powerpc/knewsticker_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/ksirc_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/kit_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/korn_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/libmimelib-dev_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/kppp_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/kmail_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/kdict_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/libmimelib1_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/klisa_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/knode_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/libkdenetwork1_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/ktalkd_2.2.2-14.7_powerpc.deb
kdenetwork (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Dirk Müller to fix file descriptor leak
    [kppp/main.cpp, CAN-2005-0205]


stable/main/binary-mipsel/ktalkd_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/knode_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/korn_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/kppp_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/ksirc_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/libkdenetwork1_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/klisa_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/kdict_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/kit_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/libmimelib-dev_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/libmimelib1_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/kmail_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/knewsticker_2.2.2-14.7_mipsel.deb
kdenetwork (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Dirk Müller to fix file descriptor leak
    [kppp/main.cpp, CAN-2005-0205]


stable/main/binary-mips/libmimelib1_2.2.2-14.7_mips.deb
stable/main/binary-mips/klisa_2.2.2-14.7_mips.deb
stable/main/binary-mips/libkdenetwork1_2.2.2-14.7_mips.deb
stable/main/binary-mips/korn_2.2.2-14.7_mips.deb
stable/main/binary-mips/knode_2.2.2-14.7_mips.deb
stable/main/binary-mips/kmail_2.2.2-14.7_mips.deb
stable/main/binary-mips/kppp_2.2.2-14.7_mips.deb
stable/main/binary-mips/knewsticker_2.2.2-14.7_mips.deb
stable/main/binary-mips/libmimelib-dev_2.2.2-14.7_mips.deb
stable/main/binary-mips/kdict_2.2.2-14.7_mips.deb
stable/main/binary-mips/kit_2.2.2-14.7_mips.deb
stable/main/binary-mips/ktalkd_2.2.2-14.7_mips.deb
stable/main/binary-mips/ksirc_2.2.2-14.7_mips.deb
kdenetwork (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Dirk Müller to fix file descriptor leak
    [kppp/main.cpp, CAN-2005-0205]


stable/main/binary-m68k/libkdenetwork1_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/klisa_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/libmimelib1_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/kmail_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/libmimelib-dev_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/knewsticker_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/kit_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/korn_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/ktalkd_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/knode_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/ksirc_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/kdict_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/kppp_2.2.2-14.7_m68k.deb
kdenetwork (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Dirk Müller to fix file descriptor leak
    [kppp/main.cpp, CAN-2005-0205]


stable/main/binary-ia64/kmail_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/libmimelib-dev_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/kppp_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/libkdenetwork1_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/knewsticker_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/korn_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/klisa_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/libmimelib1_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/ksirc_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/ktalkd_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/knode_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/kit_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/kdict_2.2.2-14.7_ia64.deb
kdenetwork (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Dirk Müller to fix file descriptor leak
    [kppp/main.cpp, CAN-2005-0205]


stable/main/binary-hppa/libmimelib1_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/knode_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/ksirc_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/ktalkd_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/klisa_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/kmail_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/knewsticker_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/kdict_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/kit_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/libkdenetwork1_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/kppp_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/korn_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/libmimelib-dev_2.2.2-14.7_hppa.deb
kdenetwork (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Dirk Müller to fix file descriptor leak
    [kppp/main.cpp, CAN-2005-0205]


stable/main/binary-arm/libkdenetwork1_2.2.2-14.7_arm.deb
stable/main/binary-arm/klisa_2.2.2-14.7_arm.deb
stable/main/binary-arm/kdict_2.2.2-14.7_arm.deb
stable/main/binary-arm/kmail_2.2.2-14.7_arm.deb
stable/main/binary-arm/korn_2.2.2-14.7_arm.deb
stable/main/binary-arm/knewsticker_2.2.2-14.7_arm.deb
stable/main/binary-arm/ktalkd_2.2.2-14.7_arm.deb
stable/main/binary-arm/knode_2.2.2-14.7_arm.deb
stable/main/binary-arm/kit_2.2.2-14.7_arm.deb
stable/main/binary-arm/ksirc_2.2.2-14.7_arm.deb
stable/main/binary-arm/libmimelib-dev_2.2.2-14.7_arm.deb
stable/main/binary-arm/kppp_2.2.2-14.7_arm.deb
stable/main/binary-arm/libmimelib1_2.2.2-14.7_arm.deb
kdenetwork (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Dirk Müller to fix file descriptor leak
    [kppp/main.cpp, CAN-2005-0205]


stable/main/binary-alpha/knode_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/libkdenetwork1_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/kit_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/kppp_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/klisa_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/libmimelib-dev_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/knewsticker_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/ktalkd_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/korn_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/kmail_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/kdict_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/ksirc_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/libmimelib1_2.2.2-14.7_alpha.deb
kdenetwork (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Dirk Müller to fix file descriptor leak
    [kppp/main.cpp, CAN-2005-0205]


stable/main/binary-i386/ksirc_2.2.2-14.7_i386.deb
stable/main/binary-i386/libmimelib-dev_2.2.2-14.7_i386.deb
stable/main/binary-i386/libmimelib1_2.2.2-14.7_i386.deb
stable/main/source/kdenetwork_2.2.2-14.7.dsc
stable/main/binary-i386/kit_2.2.2-14.7_i386.deb
stable/main/source/kdenetwork_2.2.2-14.7.diff.gz
stable/main/binary-i386/kmail_2.2.2-14.7_i386.deb
stable/main/binary-i386/kdict_2.2.2-14.7_i386.deb
stable/main/binary-i386/klisa_2.2.2-14.7_i386.deb
stable/main/binary-i386/knode_2.2.2-14.7_i386.deb
stable/main/binary-i386/ktalkd_2.2.2-14.7_i386.deb
stable/main/binary-i386/libkdenetwork1_2.2.2-14.7_i386.deb
stable/main/binary-i386/korn_2.2.2-14.7_i386.deb
stable/main/binary-i386/knewsticker_2.2.2-14.7_i386.deb
stable/main/binary-i386/kppp_2.2.2-14.7_i386.deb
kdenetwork (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Dirk Müller to fix file descriptor leak
    [kppp/main.cpp, CAN-2005-0205]


stable/main/binary-sparc/libarts-dev_2.2.2-13.woody.13_sparc.deb
stable/main/binary-sparc/kdelibs-dev_2.2.2-13.woody.13_sparc.deb
stable/main/binary-sparc/kdelibs3-cups_2.2.2-13.woody.13_sparc.deb
stable/main/binary-sparc/libarts-alsa_2.2.2-13.woody.13_sparc.deb
stable/main/binary-sparc/libkmid-alsa_2.2.2-13.woody.13_sparc.deb
stable/main/binary-sparc/libkmid_2.2.2-13.woody.13_sparc.deb
stable/main/binary-sparc/libarts_2.2.2-13.woody.13_sparc.deb
stable/main/binary-sparc/libkmid-dev_2.2.2-13.woody.13_sparc.deb
stable/main/binary-sparc/kdelibs3_2.2.2-13.woody.13_sparc.deb
stable/main/binary-sparc/kdelibs3-bin_2.2.2-13.woody.13_sparc.deb
kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix arbitrary FTP command execution
    [kio/ftp/ftp.cc, CAN-2004-1165]


stable/main/binary-s390/kdelibs-dev_2.2.2-13.woody.13_s390.deb
stable/main/binary-s390/kdelibs3-cups_2.2.2-13.woody.13_s390.deb
stable/main/binary-s390/libkmid-dev_2.2.2-13.woody.13_s390.deb
stable/main/binary-s390/kdelibs3-bin_2.2.2-13.woody.13_s390.deb
stable/main/binary-s390/libarts_2.2.2-13.woody.13_s390.deb
stable/main/binary-s390/libarts-alsa_2.2.2-13.woody.13_s390.deb
stable/main/binary-s390/libkmid-alsa_2.2.2-13.woody.13_s390.deb
stable/main/binary-s390/libkmid_2.2.2-13.woody.13_s390.deb
stable/main/binary-s390/kdelibs3_2.2.2-13.woody.13_s390.deb
stable/main/binary-s390/libarts-dev_2.2.2-13.woody.13_s390.deb
kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix arbitrary FTP command execution
    [kio/ftp/ftp.cc, CAN-2004-1165]


stable/main/binary-powerpc/libkmid_2.2.2-13.woody.13_powerpc.deb
stable/main/binary-powerpc/kdelibs3-bin_2.2.2-13.woody.13_powerpc.deb
stable/main/binary-powerpc/libarts-alsa_2.2.2-13.woody.13_powerpc.deb
stable/main/binary-powerpc/libarts_2.2.2-13.woody.13_powerpc.deb
stable/main/binary-powerpc/libkmid-dev_2.2.2-13.woody.13_powerpc.deb
stable/main/binary-powerpc/libkmid-alsa_2.2.2-13.woody.13_powerpc.deb
stable/main/binary-powerpc/kdelibs-dev_2.2.2-13.woody.13_powerpc.deb
stable/main/binary-powerpc/libarts-dev_2.2.2-13.woody.13_powerpc.deb
stable/main/binary-powerpc/kdelibs3_2.2.2-13.woody.13_powerpc.deb
stable/main/binary-powerpc/kdelibs3-cups_2.2.2-13.woody.13_powerpc.deb
kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix arbitrary FTP command execution
    [kio/ftp/ftp.cc, CAN-2004-1165]


stable/main/binary-mipsel/kdelibs3-cups_2.2.2-13.woody.13_mipsel.deb
stable/main/binary-mipsel/kdelibs-dev_2.2.2-13.woody.13_mipsel.deb
stable/main/binary-mipsel/libarts-dev_2.2.2-13.woody.13_mipsel.deb
stable/main/binary-mipsel/kdelibs3-bin_2.2.2-13.woody.13_mipsel.deb
stable/main/binary-mipsel/libarts_2.2.2-13.woody.13_mipsel.deb
stable/main/binary-mipsel/libkmid-dev_2.2.2-13.woody.13_mipsel.deb
stable/main/binary-mipsel/libkmid-alsa_2.2.2-13.woody.13_mipsel.deb
stable/main/binary-mipsel/libarts-alsa_2.2.2-13.woody.13_mipsel.deb
stable/main/binary-mipsel/kdelibs3_2.2.2-13.woody.13_mipsel.deb
stable/main/binary-mipsel/libkmid_2.2.2-13.woody.13_mipsel.deb
kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix arbitrary FTP command execution
    [kio/ftp/ftp.cc, CAN-2004-1165]


stable/main/binary-mips/kdelibs3-cups_2.2.2-13.woody.13_mips.deb
stable/main/binary-mips/libkmid-alsa_2.2.2-13.woody.13_mips.deb
stable/main/binary-mips/kdelibs3-bin_2.2.2-13.woody.13_mips.deb
stable/main/binary-mips/libarts_2.2.2-13.woody.13_mips.deb
stable/main/binary-mips/kdelibs3_2.2.2-13.woody.13_mips.deb
stable/main/binary-mips/libkmid-dev_2.2.2-13.woody.13_mips.deb
stable/main/binary-mips/libarts-alsa_2.2.2-13.woody.13_mips.deb
stable/main/binary-mips/kdelibs-dev_2.2.2-13.woody.13_mips.deb
stable/main/binary-mips/libkmid_2.2.2-13.woody.13_mips.deb
stable/main/binary-mips/libarts-dev_2.2.2-13.woody.13_mips.deb
kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix arbitrary FTP command execution
    [kio/ftp/ftp.cc, CAN-2004-1165]


stable/main/binary-m68k/libarts-alsa_2.2.2-13.woody.13_m68k.deb
stable/main/binary-m68k/kdelibs3-cups_2.2.2-13.woody.13_m68k.deb
stable/main/binary-m68k/libarts-dev_2.2.2-13.woody.13_m68k.deb
stable/main/binary-m68k/libkmid_2.2.2-13.woody.13_m68k.deb
stable/main/binary-m68k/kdelibs-dev_2.2.2-13.woody.13_m68k.deb
stable/main/binary-m68k/kdelibs3-bin_2.2.2-13.woody.13_m68k.deb
stable/main/binary-m68k/libkmid-dev_2.2.2-13.woody.13_m68k.deb
stable/main/binary-m68k/kdelibs3_2.2.2-13.woody.13_m68k.deb
stable/main/binary-m68k/libkmid-alsa_2.2.2-13.woody.13_m68k.deb
stable/main/binary-m68k/libarts_2.2.2-13.woody.13_m68k.deb
kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix arbitrary FTP command execution
    [kio/ftp/ftp.cc, CAN-2004-1165]


stable/main/binary-ia64/kdelibs3-cups_2.2.2-13.woody.13_ia64.deb
stable/main/binary-ia64/kdelibs-dev_2.2.2-13.woody.13_ia64.deb
stable/main/binary-ia64/libkmid-dev_2.2.2-13.woody.13_ia64.deb
stable/main/binary-ia64/libkmid-alsa_2.2.2-13.woody.13_ia64.deb
stable/main/binary-ia64/kdelibs3-bin_2.2.2-13.woody.13_ia64.deb
stable/main/binary-ia64/libkmid_2.2.2-13.woody.13_ia64.deb
stable/main/binary-ia64/libarts_2.2.2-13.woody.13_ia64.deb
stable/main/binary-ia64/libarts-alsa_2.2.2-13.woody.13_ia64.deb
stable/main/binary-ia64/libarts-dev_2.2.2-13.woody.13_ia64.deb
stable/main/binary-ia64/kdelibs3_2.2.2-13.woody.13_ia64.deb
kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix arbitrary FTP command execution
    [kio/ftp/ftp.cc, CAN-2004-1165]


stable/main/binary-hppa/kdelibs-dev_2.2.2-13.woody.13_hppa.deb
stable/main/binary-hppa/kdelibs3_2.2.2-13.woody.13_hppa.deb
stable/main/binary-hppa/libarts-alsa_2.2.2-13.woody.13_hppa.deb
stable/main/binary-hppa/kdelibs3-cups_2.2.2-13.woody.13_hppa.deb
stable/main/binary-hppa/libkmid_2.2.2-13.woody.13_hppa.deb
stable/main/binary-hppa/libkmid-dev_2.2.2-13.woody.13_hppa.deb
stable/main/binary-hppa/libkmid-alsa_2.2.2-13.woody.13_hppa.deb
stable/main/binary-hppa/kdelibs3-bin_2.2.2-13.woody.13_hppa.deb
stable/main/binary-hppa/libarts-dev_2.2.2-13.woody.13_hppa.deb
stable/main/binary-hppa/libarts_2.2.2-13.woody.13_hppa.deb
kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix arbitrary FTP command execution
    [kio/ftp/ftp.cc, CAN-2004-1165]


stable/main/binary-arm/kdelibs3-bin_2.2.2-13.woody.13_arm.deb
stable/main/binary-arm/kdelibs3-cups_2.2.2-13.woody.13_arm.deb
stable/main/binary-arm/libarts-alsa_2.2.2-13.woody.13_arm.deb
stable/main/binary-arm/libarts-dev_2.2.2-13.woody.13_arm.deb
stable/main/binary-arm/libkmid_2.2.2-13.woody.13_arm.deb
stable/main/binary-arm/libkmid-alsa_2.2.2-13.woody.13_arm.deb
stable/main/binary-arm/kdelibs3_2.2.2-13.woody.13_arm.deb
stable/main/binary-arm/libarts_2.2.2-13.woody.13_arm.deb
stable/main/binary-arm/kdelibs-dev_2.2.2-13.woody.13_arm.deb
stable/main/binary-arm/libkmid-dev_2.2.2-13.woody.13_arm.deb
kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix arbitrary FTP command execution
    [kio/ftp/ftp.cc, CAN-2004-1165]


stable/main/binary-alpha/kdelibs3-bin_2.2.2-13.woody.13_alpha.deb
stable/main/binary-alpha/kdelibs3-cups_2.2.2-13.woody.13_alpha.deb
stable/main/binary-alpha/libarts_2.2.2-13.woody.13_alpha.deb
stable/main/binary-alpha/libarts-dev_2.2.2-13.woody.13_alpha.deb
stable/main/binary-alpha/kdelibs3_2.2.2-13.woody.13_alpha.deb
stable/main/binary-alpha/kdelibs-dev_2.2.2-13.woody.13_alpha.deb
stable/main/binary-alpha/libkmid_2.2.2-13.woody.13_alpha.deb
stable/main/binary-alpha/libkmid-alsa_2.2.2-13.woody.13_alpha.deb
stable/main/binary-alpha/libkmid-dev_2.2.2-13.woody.13_alpha.deb
stable/main/binary-alpha/libarts-alsa_2.2.2-13.woody.13_alpha.deb
kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix arbitrary FTP command execution
    [kio/ftp/ftp.cc, CAN-2004-1165]


stable/main/source/kdelibs_2.2.2-13.woody.13.diff.gz
stable/main/binary-i386/libkmid-alsa_2.2.2-13.woody.13_i386.deb
stable/main/binary-i386/libarts-alsa_2.2.2-13.woody.13_i386.deb
stable/main/binary-i386/libkmid-dev_2.2.2-13.woody.13_i386.deb
stable/main/binary-i386/libkmid_2.2.2-13.woody.13_i386.deb
stable/main/binary-i386/kdelibs3-cups_2.2.2-13.woody.13_i386.deb
stable/main/binary-i386/kdelibs3_2.2.2-13.woody.13_i386.deb
stable/main/binary-i386/libarts_2.2.2-13.woody.13_i386.deb
stable/main/binary-i386/kdelibs3-bin_2.2.2-13.woody.13_i386.deb
stable/main/binary-all/kdelibs3-doc_2.2.2-13.woody.13_all.deb
stable/main/binary-i386/kdelibs-dev_2.2.2-13.woody.13_i386.deb
stable/main/source/kdelibs_2.2.2-13.woody.13.dsc
stable/main/binary-i386/libarts-dev_2.2.2-13.woody.13_i386.deb
kdelibs (4:2.2.2-13.woody.13) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix arbitrary FTP command execution
    [kio/ftp/ftp.cc, CAN-2004-1165]


stable/main/binary-sparc/kdm_2.2.2-14.9_sparc.deb
stable/main/binary-sparc/kscreensaver_2.2.2-14.9_sparc.deb
stable/main/binary-sparc/kdebase-libs_2.2.2-14.9_sparc.deb
stable/main/binary-sparc/kdebase-dev_2.2.2-14.9_sparc.deb
stable/main/binary-sparc/kate_2.2.2-14.9_sparc.deb
stable/main/binary-sparc/libkonq3_2.2.2-14.9_sparc.deb
stable/main/binary-sparc/libkonq-dev_2.2.2-14.9_sparc.deb
stable/main/binary-sparc/konsole_2.2.2-14.9_sparc.deb
stable/main/binary-sparc/kdebase-audiolibs_2.2.2-14.9_sparc.deb
stable/main/binary-sparc/konqueror_2.2.2-14.9_sparc.deb
stable/main/binary-sparc/kdebase_2.2.2-14.9_sparc.deb
kdebase (4:2.2.2-14.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Raphaël Enrici to fix password bypass in certain
    conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078]


stable/main/binary-s390/libkonq3_2.2.2-14.9_s390.deb
stable/main/binary-s390/konsole_2.2.2-14.9_s390.deb
stable/main/binary-s390/kdebase_2.2.2-14.9_s390.deb
stable/main/binary-s390/kdebase-audiolibs_2.2.2-14.9_s390.deb
stable/main/binary-s390/kscreensaver_2.2.2-14.9_s390.deb
stable/main/binary-s390/kdebase-dev_2.2.2-14.9_s390.deb
stable/main/binary-s390/kdebase-libs_2.2.2-14.9_s390.deb
stable/main/binary-s390/kate_2.2.2-14.9_s390.deb
stable/main/binary-s390/libkonq-dev_2.2.2-14.9_s390.deb
stable/main/binary-s390/konqueror_2.2.2-14.9_s390.deb
stable/main/binary-s390/kdm_2.2.2-14.9_s390.deb
kdebase (4:2.2.2-14.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Raphaël Enrici to fix password bypass in certain
    conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078]


stable/main/binary-powerpc/konqueror_2.2.2-14.9_powerpc.deb
stable/main/binary-powerpc/kdebase-libs_2.2.2-14.9_powerpc.deb
stable/main/binary-powerpc/libkonq3_2.2.2-14.9_powerpc.deb
stable/main/binary-powerpc/libkonq-dev_2.2.2-14.9_powerpc.deb
stable/main/binary-powerpc/kdebase-audiolibs_2.2.2-14.9_powerpc.deb
stable/main/binary-powerpc/kdebase_2.2.2-14.9_powerpc.deb
stable/main/binary-powerpc/kate_2.2.2-14.9_powerpc.deb
stable/main/binary-powerpc/konsole_2.2.2-14.9_powerpc.deb
stable/main/binary-powerpc/kscreensaver_2.2.2-14.9_powerpc.deb
stable/main/binary-powerpc/kdm_2.2.2-14.9_powerpc.deb
stable/main/binary-powerpc/kdebase-dev_2.2.2-14.9_powerpc.deb
kdebase (4:2.2.2-14.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Raphaël Enrici to fix password bypass in certain
    conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078]


stable/main/binary-mipsel/libkonq-dev_2.2.2-14.9_mipsel.deb
stable/main/binary-mipsel/libkonq3_2.2.2-14.9_mipsel.deb
stable/main/binary-mipsel/kscreensaver_2.2.2-14.9_mipsel.deb
stable/main/binary-mipsel/kdm_2.2.2-14.9_mipsel.deb
stable/main/binary-mipsel/kdebase-dev_2.2.2-14.9_mipsel.deb
stable/main/binary-mipsel/konsole_2.2.2-14.9_mipsel.deb
stable/main/binary-mipsel/kdebase_2.2.2-14.9_mipsel.deb
stable/main/binary-mipsel/konqueror_2.2.2-14.9_mipsel.deb
stable/main/binary-mipsel/kdebase-audiolibs_2.2.2-14.9_mipsel.deb
stable/main/binary-mipsel/kdebase-libs_2.2.2-14.9_mipsel.deb
stable/main/binary-mipsel/kate_2.2.2-14.9_mipsel.deb
kdebase (4:2.2.2-14.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Raphaël Enrici to fix password bypass in certain
    conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078]


stable/main/binary-mips/konqueror_2.2.2-14.9_mips.deb
stable/main/binary-mips/kate_2.2.2-14.9_mips.deb
stable/main/binary-mips/libkonq3_2.2.2-14.9_mips.deb
stable/main/binary-mips/kdm_2.2.2-14.9_mips.deb
stable/main/binary-mips/kdebase_2.2.2-14.9_mips.deb
stable/main/binary-mips/kscreensaver_2.2.2-14.9_mips.deb
stable/main/binary-mips/libkonq-dev_2.2.2-14.9_mips.deb
stable/main/binary-mips/kdebase-libs_2.2.2-14.9_mips.deb
stable/main/binary-mips/konsole_2.2.2-14.9_mips.deb
stable/main/binary-mips/kdebase-audiolibs_2.2.2-14.9_mips.deb
stable/main/binary-mips/kdebase-dev_2.2.2-14.9_mips.deb
kdebase (4:2.2.2-14.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Raphaël Enrici to fix password bypass in certain
    conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078]


stable/main/binary-m68k/konqueror_2.2.2-14.9_m68k.deb
stable/main/binary-m68k/libkonq-dev_2.2.2-14.9_m68k.deb
stable/main/binary-m68k/kdm_2.2.2-14.9_m68k.deb
stable/main/binary-m68k/kdebase_2.2.2-14.9_m68k.deb
stable/main/binary-m68k/kdebase-dev_2.2.2-14.9_m68k.deb
stable/main/binary-m68k/kate_2.2.2-14.9_m68k.deb
stable/main/binary-m68k/libkonq3_2.2.2-14.9_m68k.deb
stable/main/binary-m68k/kscreensaver_2.2.2-14.9_m68k.deb
stable/main/binary-m68k/kdebase-audiolibs_2.2.2-14.9_m68k.deb
stable/main/binary-m68k/kdebase-libs_2.2.2-14.9_m68k.deb
stable/main/binary-m68k/konsole_2.2.2-14.9_m68k.deb
kdebase (4:2.2.2-14.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Raphaël Enrici to fix password bypass in certain
    conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078]


stable/main/binary-ia64/kdm_2.2.2-14.9_ia64.deb
stable/main/binary-ia64/kscreensaver_2.2.2-14.9_ia64.deb
stable/main/binary-ia64/konsole_2.2.2-14.9_ia64.deb
stable/main/binary-ia64/kdebase-audiolibs_2.2.2-14.9_ia64.deb
stable/main/binary-ia64/kdebase_2.2.2-14.9_ia64.deb
stable/main/binary-ia64/libkonq-dev_2.2.2-14.9_ia64.deb
stable/main/binary-ia64/kate_2.2.2-14.9_ia64.deb
stable/main/binary-ia64/kdebase-dev_2.2.2-14.9_ia64.deb
stable/main/binary-ia64/libkonq3_2.2.2-14.9_ia64.deb
stable/main/binary-ia64/kdebase-libs_2.2.2-14.9_ia64.deb
stable/main/binary-ia64/konqueror_2.2.2-14.9_ia64.deb
kdebase (4:2.2.2-14.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Raphaël Enrici to fix password bypass in certain
    conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078]


stable/main/binary-hppa/kdebase_2.2.2-14.9_hppa.deb
stable/main/binary-hppa/kdm_2.2.2-14.9_hppa.deb
stable/main/binary-hppa/kate_2.2.2-14.9_hppa.deb
stable/main/binary-hppa/konqueror_2.2.2-14.9_hppa.deb
stable/main/binary-hppa/kdebase-dev_2.2.2-14.9_hppa.deb
stable/main/binary-hppa/kdebase-audiolibs_2.2.2-14.9_hppa.deb
stable/main/binary-hppa/libkonq3_2.2.2-14.9_hppa.deb
stable/main/binary-hppa/libkonq-dev_2.2.2-14.9_hppa.deb
stable/main/binary-hppa/kscreensaver_2.2.2-14.9_hppa.deb
stable/main/binary-hppa/konsole_2.2.2-14.9_hppa.deb
stable/main/binary-hppa/kdebase-libs_2.2.2-14.9_hppa.deb
kdebase (4:2.2.2-14.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Raphaël Enrici to fix password bypass in certain
    conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078]


stable/main/binary-arm/kate_2.2.2-14.9_arm.deb
stable/main/binary-arm/kdebase-dev_2.2.2-14.9_arm.deb
stable/main/binary-arm/kdebase-libs_2.2.2-14.9_arm.deb
stable/main/binary-arm/kdm_2.2.2-14.9_arm.deb
stable/main/binary-arm/kdebase-audiolibs_2.2.2-14.9_arm.deb
stable/main/binary-arm/konsole_2.2.2-14.9_arm.deb
stable/main/binary-arm/kdebase_2.2.2-14.9_arm.deb
stable/main/binary-arm/libkonq-dev_2.2.2-14.9_arm.deb
stable/main/binary-arm/kscreensaver_2.2.2-14.9_arm.deb
stable/main/binary-arm/konqueror_2.2.2-14.9_arm.deb
stable/main/binary-arm/libkonq3_2.2.2-14.9_arm.deb
kdebase (4:2.2.2-14.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Raphaël Enrici to fix password bypass in certain
    conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078]


stable/main/binary-alpha/konsole_2.2.2-14.9_alpha.deb
stable/main/binary-alpha/libkonq3_2.2.2-14.9_alpha.deb
stable/main/binary-alpha/kdebase_2.2.2-14.9_alpha.deb
stable/main/binary-alpha/libkonq-dev_2.2.2-14.9_alpha.deb
stable/main/binary-alpha/kate_2.2.2-14.9_alpha.deb
stable/main/binary-alpha/kdebase-dev_2.2.2-14.9_alpha.deb
stable/main/binary-alpha/konqueror_2.2.2-14.9_alpha.deb
stable/main/binary-alpha/kscreensaver_2.2.2-14.9_alpha.deb
stable/main/binary-alpha/kdm_2.2.2-14.9_alpha.deb
stable/main/binary-alpha/kdebase-audiolibs_2.2.2-14.9_alpha.deb
stable/main/binary-alpha/kdebase-libs_2.2.2-14.9_alpha.deb
kdebase (4:2.2.2-14.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Raphaël Enrici to fix password bypass in certain
    conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078]


stable/main/binary-all/kdewallpapers_2.2.2-14.9_all.deb
stable/main/binary-i386/kscreensaver_2.2.2-14.9_i386.deb
stable/main/source/kdebase_2.2.2-14.9.dsc
stable/main/binary-i386/kdebase-audiolibs_2.2.2-14.9_i386.deb
stable/main/binary-i386/kdebase-dev_2.2.2-14.9_i386.deb
stable/main/source/kdebase_2.2.2-14.9.diff.gz
stable/main/binary-i386/libkonq-dev_2.2.2-14.9_i386.deb
stable/main/binary-all/kdebase-doc_2.2.2-14.9_all.deb
stable/main/binary-i386/kdebase_2.2.2-14.9_i386.deb
stable/main/binary-i386/kdm_2.2.2-14.9_i386.deb
stable/main/binary-i386/konsole_2.2.2-14.9_i386.deb
stable/main/binary-i386/kdebase-libs_2.2.2-14.9_i386.deb
stable/main/binary-i386/libkonq3_2.2.2-14.9_i386.deb
stable/main/binary-i386/konqueror_2.2.2-14.9_i386.deb
stable/main/binary-i386/kate_2.2.2-14.9_i386.deb
kdebase (4:2.2.2-14.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Raphaël Enrici to fix password bypass in certain
    conditions [kdesktop/lockeng.cc, kdesktop/lockdlg.cc, CAN-2005-0078]


stable/main/binary-sparc/libimlib2-dev_1.0.5-2woody2_sparc.deb
stable/main/binary-sparc/libimlib2_1.0.5-2woody2_sparc.deb
imlib2 (1.0.5-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Backported patch from imlib to integer overflows
    [loaders/loader_xpm.c, CAN-2004-1026]


stable/main/binary-s390/libimlib2-dev_1.0.5-2woody2_s390.deb
stable/main/binary-s390/libimlib2_1.0.5-2woody2_s390.deb
imlib2 (1.0.5-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Backported patch from imlib to integer overflows
    [loaders/loader_xpm.c, CAN-2004-1026]


stable/main/binary-powerpc/libimlib2-dev_1.0.5-2woody2_powerpc.deb
stable/main/binary-powerpc/libimlib2_1.0.5-2woody2_powerpc.deb
imlib2 (1.0.5-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Backported patch from imlib to integer overflows
    [loaders/loader_xpm.c, CAN-2004-1026]


stable/main/binary-mips/libimlib2-dev_1.0.5-2woody2_mips.deb
stable/main/binary-mips/libimlib2_1.0.5-2woody2_mips.deb
imlib2 (1.0.5-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Backported patch from imlib to integer overflows
    [loaders/loader_xpm.c, CAN-2004-1026]


stable/main/binary-m68k/libimlib2_1.0.5-2woody2_m68k.deb
stable/main/binary-m68k/libimlib2-dev_1.0.5-2woody2_m68k.deb
imlib2 (1.0.5-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Backported patch from imlib to integer overflows
    [loaders/loader_xpm.c, CAN-2004-1026]


stable/main/binary-ia64/libimlib2-dev_1.0.5-2woody2_ia64.deb
stable/main/binary-ia64/libimlib2_1.0.5-2woody2_ia64.deb
imlib2 (1.0.5-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Backported patch from imlib to integer overflows
    [loaders/loader_xpm.c, CAN-2004-1026]


stable/main/binary-i386/libimlib2_1.0.5-2woody2_i386.deb
stable/main/binary-i386/libimlib2-dev_1.0.5-2woody2_i386.deb
imlib2 (1.0.5-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Backported patch from imlib to integer overflows
    [loaders/loader_xpm.c, CAN-2004-1026]


stable/main/binary-hppa/libimlib2-dev_1.0.5-2woody2_hppa.deb
stable/main/binary-hppa/libimlib2_1.0.5-2woody2_hppa.deb
imlib2 (1.0.5-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Backported patch from imlib to integer overflows
    [loaders/loader_xpm.c, CAN-2004-1026]


stable/main/binary-arm/libimlib2_1.0.5-2woody2_arm.deb
stable/main/binary-arm/libimlib2-dev_1.0.5-2woody2_arm.deb
imlib2 (1.0.5-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Backported patch from imlib to integer overflows
    [loaders/loader_xpm.c, CAN-2004-1026]


stable/main/binary-alpha/libimlib2_1.0.5-2woody2_alpha.deb
stable/main/binary-alpha/libimlib2-dev_1.0.5-2woody2_alpha.deb
imlib2 (1.0.5-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Backported patch from imlib to integer overflows
    [loaders/loader_xpm.c, CAN-2004-1026]


stable/main/binary-mipsel/libimlib2-dev_1.0.5-2woody2_mipsel.deb
stable/main/source/imlib2_1.0.5-2woody2.dsc
stable/main/binary-mipsel/libimlib2_1.0.5-2woody2_mipsel.deb
stable/main/source/imlib2_1.0.5-2woody2.diff.gz
imlib2 (1.0.5-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Backported patch from imlib to integer overflows
    [loaders/loader_xpm.c, CAN-2004-1026]


stable/main/binary-sparc/libmagick++5-dev_5.4.4.5-1woody6_sparc.deb
stable/main/binary-sparc/libmagick++5_5.4.4.5-1woody6_sparc.deb
stable/main/binary-sparc/libmagick5_5.4.4.5-1woody6_sparc.deb
stable/main/binary-sparc/perlmagick_5.4.4.5-1woody6_sparc.deb
stable/main/binary-sparc/libmagick5-dev_5.4.4.5-1woody6_sparc.deb
stable/main/binary-sparc/imagemagick_5.4.4.5-1woody6_sparc.deb
imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Backported patch by Tavis Ormandy to fix format string vulnerability
    [magick/image.c, CAN-2005-0397]
  * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759]
  * Applied patch to fix out of bounds memory access [coders/tiff.c,
    CAN-2005-0760]
  * Backported patch to fix heap buffer overflow [coders/sgi.c,
    CAN-2005-0762]


stable/main/binary-s390/libmagick5-dev_5.4.4.5-1woody6_s390.deb
stable/main/binary-s390/libmagick++5_5.4.4.5-1woody6_s390.deb
stable/main/binary-s390/imagemagick_5.4.4.5-1woody6_s390.deb
stable/main/binary-s390/libmagick++5-dev_5.4.4.5-1woody6_s390.deb
stable/main/binary-s390/perlmagick_5.4.4.5-1woody6_s390.deb
stable/main/binary-s390/libmagick5_5.4.4.5-1woody6_s390.deb
imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Backported patch by Tavis Ormandy to fix format string vulnerability
    [magick/image.c, CAN-2005-0397]
  * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759]
  * Applied patch to fix out of bounds memory access [coders/tiff.c,
    CAN-2005-0760]
  * Backported patch to fix heap buffer overflow [coders/sgi.c,
    CAN-2005-0762]


stable/main/binary-powerpc/imagemagick_5.4.4.5-1woody6_powerpc.deb
stable/main/binary-powerpc/libmagick++5_5.4.4.5-1woody6_powerpc.deb
stable/main/binary-powerpc/perlmagick_5.4.4.5-1woody6_powerpc.deb
stable/main/binary-powerpc/libmagick++5-dev_5.4.4.5-1woody6_powerpc.deb
stable/main/binary-powerpc/libmagick5_5.4.4.5-1woody6_powerpc.deb
stable/main/binary-powerpc/libmagick5-dev_5.4.4.5-1woody6_powerpc.deb
imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Backported patch by Tavis Ormandy to fix format string vulnerability
    [magick/image.c, CAN-2005-0397]
  * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759]
  * Applied patch to fix out of bounds memory access [coders/tiff.c,
    CAN-2005-0760]
  * Backported patch to fix heap buffer overflow [coders/sgi.c,
    CAN-2005-0762]


stable/main/binary-mipsel/libmagick5_5.4.4.5-1woody6_mipsel.deb
stable/main/binary-mipsel/perlmagick_5.4.4.5-1woody6_mipsel.deb
stable/main/binary-mipsel/libmagick5-dev_5.4.4.5-1woody6_mipsel.deb
stable/main/binary-mipsel/libmagick++5-dev_5.4.4.5-1woody6_mipsel.deb
stable/main/binary-mipsel/libmagick++5_5.4.4.5-1woody6_mipsel.deb
stable/main/binary-mipsel/imagemagick_5.4.4.5-1woody6_mipsel.deb
imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Backported patch by Tavis Ormandy to fix format string vulnerability
    [magick/image.c, CAN-2005-0397]
  * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759]
  * Applied patch to fix out of bounds memory access [coders/tiff.c,
    CAN-2005-0760]
  * Backported patch to fix heap buffer overflow [coders/sgi.c,
    CAN-2005-0762]


stable/main/binary-mips/perlmagick_5.4.4.5-1woody6_mips.deb
stable/main/binary-mips/libmagick5-dev_5.4.4.5-1woody6_mips.deb
stable/main/binary-mips/libmagick5_5.4.4.5-1woody6_mips.deb
stable/main/binary-mips/libmagick++5-dev_5.4.4.5-1woody6_mips.deb
stable/main/binary-mips/imagemagick_5.4.4.5-1woody6_mips.deb
stable/main/binary-mips/libmagick++5_5.4.4.5-1woody6_mips.deb
imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Backported patch by Tavis Ormandy to fix format string vulnerability
    [magick/image.c, CAN-2005-0397]
  * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759]
  * Applied patch to fix out of bounds memory access [coders/tiff.c,
    CAN-2005-0760]
  * Backported patch to fix heap buffer overflow [coders/sgi.c,
    CAN-2005-0762]


stable/main/binary-m68k/libmagick5_5.4.4.5-1woody6_m68k.deb
stable/main/binary-m68k/libmagick5-dev_5.4.4.5-1woody6_m68k.deb
stable/main/binary-m68k/libmagick++5_5.4.4.5-1woody6_m68k.deb
stable/main/binary-m68k/libmagick++5-dev_5.4.4.5-1woody6_m68k.deb
stable/main/binary-m68k/imagemagick_5.4.4.5-1woody6_m68k.deb
stable/main/binary-m68k/perlmagick_5.4.4.5-1woody6_m68k.deb
imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Backported patch by Tavis Ormandy to fix format string vulnerability
    [magick/image.c, CAN-2005-0397]
  * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759]
  * Applied patch to fix out of bounds memory access [coders/tiff.c,
    CAN-2005-0760]
  * Backported patch to fix heap buffer overflow [coders/sgi.c,
    CAN-2005-0762]


stable/main/binary-ia64/libmagick5-dev_5.4.4.5-1woody6_ia64.deb
stable/main/binary-ia64/imagemagick_5.4.4.5-1woody6_ia64.deb
stable/main/binary-ia64/perlmagick_5.4.4.5-1woody6_ia64.deb
stable/main/binary-ia64/libmagick++5-dev_5.4.4.5-1woody6_ia64.deb
stable/main/binary-ia64/libmagick++5_5.4.4.5-1woody6_ia64.deb
stable/main/binary-ia64/libmagick5_5.4.4.5-1woody6_ia64.deb
imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Backported patch by Tavis Ormandy to fix format string vulnerability
    [magick/image.c, CAN-2005-0397]
  * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759]
  * Applied patch to fix out of bounds memory access [coders/tiff.c,
    CAN-2005-0760]
  * Backported patch to fix heap buffer overflow [coders/sgi.c,
    CAN-2005-0762]


stable/main/binary-i386/libmagick5_5.4.4.5-1woody6_i386.deb
stable/main/binary-i386/libmagick++5-dev_5.4.4.5-1woody6_i386.deb
stable/main/binary-i386/imagemagick_5.4.4.5-1woody6_i386.deb
stable/main/binary-i386/perlmagick_5.4.4.5-1woody6_i386.deb
stable/main/binary-i386/libmagick++5_5.4.4.5-1woody6_i386.deb
stable/main/binary-i386/libmagick5-dev_5.4.4.5-1woody6_i386.deb
imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Backported patch by Tavis Ormandy to fix format string vulnerability
    [magick/image.c, CAN-2005-0397]
  * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759]
  * Applied patch to fix out of bounds memory access [coders/tiff.c,
    CAN-2005-0760]
  * Backported patch to fix heap buffer overflow [coders/sgi.c,
    CAN-2005-0762]


stable/main/binary-hppa/libmagick++5-dev_5.4.4.5-1woody6_hppa.deb
stable/main/binary-hppa/libmagick5_5.4.4.5-1woody6_hppa.deb
stable/main/binary-hppa/imagemagick_5.4.4.5-1woody6_hppa.deb
stable/main/binary-hppa/libmagick5-dev_5.4.4.5-1woody6_hppa.deb
stable/main/binary-hppa/perlmagick_5.4.4.5-1woody6_hppa.deb
stable/main/binary-hppa/libmagick++5_5.4.4.5-1woody6_hppa.deb
imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Backported patch by Tavis Ormandy to fix format string vulnerability
    [magick/image.c, CAN-2005-0397]
  * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759]
  * Applied patch to fix out of bounds memory access [coders/tiff.c,
    CAN-2005-0760]
  * Backported patch to fix heap buffer overflow [coders/sgi.c,
    CAN-2005-0762]


stable/main/binary-alpha/perlmagick_5.4.4.5-1woody6_alpha.deb
stable/main/binary-alpha/libmagick5-dev_5.4.4.5-1woody6_alpha.deb
stable/main/binary-alpha/imagemagick_5.4.4.5-1woody6_alpha.deb
stable/main/binary-alpha/libmagick5_5.4.4.5-1woody6_alpha.deb
stable/main/binary-alpha/libmagick++5_5.4.4.5-1woody6_alpha.deb
stable/main/binary-alpha/libmagick++5-dev_5.4.4.5-1woody6_alpha.deb
imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Backported patch by Tavis Ormandy to fix format string vulnerability
    [magick/image.c, CAN-2005-0397]
  * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759]
  * Applied patch to fix out of bounds memory access [coders/tiff.c,
    CAN-2005-0760]
  * Backported patch to fix heap buffer overflow [coders/sgi.c,
    CAN-2005-0762]


stable/main/source/imagemagick_5.4.4.5-1woody6.diff.gz
stable/main/binary-arm/libmagick++5_5.4.4.5-1woody6_arm.deb
stable/main/binary-arm/perlmagick_5.4.4.5-1woody6_arm.deb
stable/main/binary-arm/imagemagick_5.4.4.5-1woody6_arm.deb
stable/main/source/imagemagick_5.4.4.5-1woody6.dsc
stable/main/binary-arm/libmagick++5-dev_5.4.4.5-1woody6_arm.deb
stable/main/binary-arm/libmagick5_5.4.4.5-1woody6_arm.deb
stable/main/binary-arm/libmagick5-dev_5.4.4.5-1woody6_arm.deb
imagemagick (4:5.4.4.5-1woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Backported patch by Tavis Ormandy to fix format string vulnerability
    [magick/image.c, CAN-2005-0397]
  * Applied patch to fix denial of service [coders/tiff.c, CAN-2005-0759]
  * Applied patch to fix out of bounds memory access [coders/tiff.c,
    CAN-2005-0760]
  * Backported patch to fix heap buffer overflow [coders/sgi.c,
    CAN-2005-0762]


stable/main/binary-sparc/hztty_2.0-5.2woody2_sparc.deb
hztty (2.0-5.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Drop setgid privileges before executing the user supplied shell
    command [main.c, CAN-2005-0019]


stable/main/binary-s390/hztty_2.0-5.2woody2_s390.deb
hztty (2.0-5.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Drop setgid privileges before executing the user supplied shell
    command [main.c, CAN-2005-0019]


stable/main/binary-powerpc/hztty_2.0-5.2woody2_powerpc.deb
hztty (2.0-5.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Drop setgid privileges before executing the user supplied shell
    command [main.c, CAN-2005-0019]


stable/main/binary-mips/hztty_2.0-5.2woody2_mips.deb
hztty (2.0-5.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Drop setgid privileges before executing the user supplied shell
    command [main.c, CAN-2005-0019]


stable/main/binary-m68k/hztty_2.0-5.2woody2_m68k.deb
hztty (2.0-5.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Drop setgid privileges before executing the user supplied shell
    command [main.c, CAN-2005-0019]


stable/main/binary-ia64/hztty_2.0-5.2woody2_ia64.deb
hztty (2.0-5.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Drop setgid privileges before executing the user supplied shell
    command [main.c, CAN-2005-0019]


stable/main/binary-i386/hztty_2.0-5.2woody2_i386.deb
hztty (2.0-5.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Drop setgid privileges before executing the user supplied shell
    command [main.c, CAN-2005-0019]


stable/main/binary-hppa/hztty_2.0-5.2woody2_hppa.deb
hztty (2.0-5.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Drop setgid privileges before executing the user supplied shell
    command [main.c, CAN-2005-0019]


stable/main/binary-arm/hztty_2.0-5.2woody2_arm.deb
hztty (2.0-5.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Drop setgid privileges before executing the user supplied shell
    command [main.c, CAN-2005-0019]


stable/main/binary-alpha/hztty_2.0-5.2woody2_alpha.deb
hztty (2.0-5.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Drop setgid privileges before executing the user supplied shell
    command [main.c, CAN-2005-0019]


stable/main/source/hztty_2.0-5.2woody2.dsc
stable/main/binary-mipsel/hztty_2.0-5.2woody2_mipsel.deb
stable/main/source/hztty_2.0-5.2woody2.diff.gz
hztty (2.0-5.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Drop setgid privileges before executing the user supplied shell
    command [main.c, CAN-2005-0019]


stable/main/binary-sparc/hylafax-server_4.1.1-3.1_sparc.deb
stable/main/binary-sparc/hylafax-client_4.1.1-3.1_sparc.deb
hylafax (1:4.1.1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix unauthorised access vulnerability
    [hfaxd/InetFaxServer.c++, User.c++, CAN-2004-1182]


stable/main/binary-s390/hylafax-client_4.1.1-3.1_s390.deb
stable/main/binary-s390/hylafax-server_4.1.1-3.1_s390.deb
hylafax (1:4.1.1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix unauthorised access vulnerability
    [hfaxd/InetFaxServer.c++, User.c++, CAN-2004-1182]


stable/main/binary-powerpc/hylafax-client_4.1.1-3.1_powerpc.deb
stable/main/binary-powerpc/hylafax-server_4.1.1-3.1_powerpc.deb
hylafax (1:4.1.1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix unauthorised access vulnerability
    [hfaxd/InetFaxServer.c++, User.c++, CAN-2004-1182]


stable/main/binary-m68k/hylafax-server_4.1.1-3.1_m68k.deb
stable/main/binary-m68k/hylafax-client_4.1.1-3.1_m68k.deb
hylafax (1:4.1.1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix unauthorised access vulnerability
    [hfaxd/InetFaxServer.c++, User.c++, CAN-2004-1182]


stable/main/binary-ia64/hylafax-client_4.1.1-3.1_ia64.deb
stable/main/binary-ia64/hylafax-server_4.1.1-3.1_ia64.deb
hylafax (1:4.1.1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix unauthorised access vulnerability
    [hfaxd/InetFaxServer.c++, User.c++, CAN-2004-1182]


stable/main/binary-hppa/hylafax-client_4.1.1-3.1_hppa.deb
stable/main/binary-hppa/hylafax-server_4.1.1-3.1_hppa.deb
hylafax (1:4.1.1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix unauthorised access vulnerability
    [hfaxd/InetFaxServer.c++, User.c++, CAN-2004-1182]


stable/main/binary-arm/hylafax-server_4.1.1-3.1_arm.deb
stable/main/binary-arm/hylafax-client_4.1.1-3.1_arm.deb
hylafax (1:4.1.1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix unauthorised access vulnerability
    [hfaxd/InetFaxServer.c++, User.c++, CAN-2004-1182]


stable/main/binary-alpha/hylafax-server_4.1.1-3.1_alpha.deb
stable/main/binary-alpha/hylafax-client_4.1.1-3.1_alpha.deb
hylafax (1:4.1.1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix unauthorised access vulnerability
    [hfaxd/InetFaxServer.c++, User.c++, CAN-2004-1182]


stable/main/source/hylafax_4.1.1-3.1.diff.gz
stable/main/binary-i386/hylafax-client_4.1.1-3.1_i386.deb
stable/main/binary-all/hylafax-doc_4.1.1-3.1_all.deb
stable/main/source/hylafax_4.1.1-3.1.dsc
stable/main/binary-i386/hylafax-server_4.1.1-3.1_i386.deb
hylafax (1:4.1.1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix unauthorised access vulnerability
    [hfaxd/InetFaxServer.c++, User.c++, CAN-2004-1182]


stable/main/source/htmlheadline_21.8-3.dsc
stable/main/binary-all/htmlheadline_21.8-3_all.deb
stable/main/source/htmlheadline_21.8-3.diff.gz
htmlheadline (21.8-3) stable; urgency=high
  * Fix temporary file vulnerabilities by locating the temporary download
    directory in the user's homedir. [HtmlHeadLine.sh, START_HHL_30.sh,
    START_HHL.sh, CAN-2004-1181]


stable/main/binary-sparc/htdig_3.1.6-3woody1_sparc.deb
htdig (3.1.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Phil Knirsch to fix cross-site scripting
    vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc,
    htmerge/htmerge.cc, CAN-2005-0085]


stable/main/binary-s390/htdig_3.1.6-3woody1_s390.deb
htdig (3.1.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Phil Knirsch to fix cross-site scripting
    vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc,
    htmerge/htmerge.cc, CAN-2005-0085]


stable/main/binary-powerpc/htdig_3.1.6-3woody1_powerpc.deb
htdig (3.1.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Phil Knirsch to fix cross-site scripting
    vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc,
    htmerge/htmerge.cc, CAN-2005-0085]


stable/main/binary-mips/htdig_3.1.6-3woody1_mips.deb
htdig (3.1.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Phil Knirsch to fix cross-site scripting
    vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc,
    htmerge/htmerge.cc, CAN-2005-0085]


stable/main/binary-m68k/htdig_3.1.6-3woody1_m68k.deb
htdig (3.1.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Phil Knirsch to fix cross-site scripting
    vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc,
    htmerge/htmerge.cc, CAN-2005-0085]


stable/main/binary-ia64/htdig_3.1.6-3woody1_ia64.deb
htdig (3.1.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Phil Knirsch to fix cross-site scripting
    vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc,
    htmerge/htmerge.cc, CAN-2005-0085]


stable/main/binary-i386/htdig_3.1.6-3woody1_i386.deb
htdig (3.1.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Phil Knirsch to fix cross-site scripting
    vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc,
    htmerge/htmerge.cc, CAN-2005-0085]


stable/main/binary-hppa/htdig_3.1.6-3woody1_hppa.deb
htdig (3.1.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Phil Knirsch to fix cross-site scripting
    vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc,
    htmerge/htmerge.cc, CAN-2005-0085]


stable/main/binary-arm/htdig_3.1.6-3woody1_arm.deb
htdig (3.1.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Phil Knirsch to fix cross-site scripting
    vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc,
    htmerge/htmerge.cc, CAN-2005-0085]


stable/main/binary-alpha/htdig_3.1.6-3woody1_alpha.deb
htdig (3.1.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Phil Knirsch to fix cross-site scripting
    vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc,
    htmerge/htmerge.cc, CAN-2005-0085]


stable/main/source/htdig_3.1.6-3woody1.dsc
stable/main/binary-all/htdig-doc_3.1.6-3woody1_all.deb
stable/main/binary-mipsel/htdig_3.1.6-3woody1_mipsel.deb
stable/main/source/htdig_3.1.6-3woody1.diff.gz
htdig (3.1.6-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Phil Knirsch to fix cross-site scripting
    vulnerability [htsearch/htsearch.cc, htfuzzy/htfuzzy.cc,
    htmerge/htmerge.cc, CAN-2005-0085]


stable/main/binary-sparc/gopherd_3.0.3woody2_sparc.deb
stable/main/binary-sparc/gopher_3.0.3woody2_sparc.deb
gopher (3.0.3woody2) stable-security; urgency=high
  * Non-maintainer upload for the Security Team.
  * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560]
  * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561]
  * Sponsored by Martin Schulze <joey@debian.org>. Thank you!


stable/main/binary-s390/gopherd_3.0.3woody2_s390.deb
stable/main/binary-s390/gopher_3.0.3woody2_s390.deb
gopher (3.0.3woody2) stable-security; urgency=high
  * Non-maintainer upload for the Security Team.
  * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560]
  * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561]
  * Sponsored by Martin Schulze <joey@debian.org>. Thank you!


stable/main/binary-powerpc/gopherd_3.0.3woody2_powerpc.deb
stable/main/binary-powerpc/gopher_3.0.3woody2_powerpc.deb
gopher (3.0.3woody2) stable-security; urgency=high
  * Non-maintainer upload for the Security Team.
  * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560]
  * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561]
  * Sponsored by Martin Schulze <joey@debian.org>. Thank you!


stable/main/binary-mips/gopherd_3.0.3woody2_mips.deb
stable/main/binary-mips/gopher_3.0.3woody2_mips.deb
gopher (3.0.3woody2) stable-security; urgency=high
  * Non-maintainer upload for the Security Team.
  * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560]
  * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561]
  * Sponsored by Martin Schulze <joey@debian.org>. Thank you!


stable/main/binary-m68k/gopher_3.0.3woody2_m68k.deb
stable/main/binary-m68k/gopherd_3.0.3woody2_m68k.deb
gopher (3.0.3woody2) stable-security; urgency=high
  * Non-maintainer upload for the Security Team.
  * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560]
  * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561]
  * Sponsored by Martin Schulze <joey@debian.org>. Thank you!


stable/main/binary-ia64/gopher_3.0.3woody2_ia64.deb
stable/main/binary-ia64/gopherd_3.0.3woody2_ia64.deb
gopher (3.0.3woody2) stable-security; urgency=high
  * Non-maintainer upload for the Security Team.
  * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560]
  * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561]
  * Sponsored by Martin Schulze <joey@debian.org>. Thank you!


stable/main/binary-i386/gopher_3.0.3woody2_i386.deb
stable/main/binary-i386/gopherd_3.0.3woody2_i386.deb
gopher (3.0.3woody2) stable-security; urgency=high
  * Non-maintainer upload for the Security Team.
  * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560]
  * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561]
  * Sponsored by Martin Schulze <joey@debian.org>. Thank you!


stable/main/binary-hppa/gopherd_3.0.3woody2_hppa.deb
stable/main/binary-hppa/gopher_3.0.3woody2_hppa.deb
gopher (3.0.3woody2) stable-security; urgency=high
  * Non-maintainer upload for the Security Team.
  * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560]
  * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561]
  * Sponsored by Martin Schulze <joey@debian.org>. Thank you!


stable/main/binary-arm/gopher_3.0.3woody2_arm.deb
stable/main/binary-arm/gopherd_3.0.3woody2_arm.deb
gopher (3.0.3woody2) stable-security; urgency=high
  * Non-maintainer upload for the Security Team.
  * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560]
  * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561]
  * Sponsored by Martin Schulze <joey@debian.org>. Thank you!


stable/main/binary-alpha/gopher_3.0.3woody2_alpha.deb
stable/main/binary-alpha/gopherd_3.0.3woody2_alpha.deb
gopher (3.0.3woody2) stable-security; urgency=high
  * Non-maintainer upload for the Security Team.
  * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560]
  * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561]
  * Sponsored by Martin Schulze <joey@debian.org>. Thank you!


stable/main/binary-mipsel/gopher_3.0.3woody2_mipsel.deb
stable/main/source/gopher_3.0.3woody2.dsc
stable/main/source/gopher_3.0.3woody2.tar.gz
stable/main/binary-mipsel/gopherd_3.0.3woody2_mipsel.deb
gopher (3.0.3woody2) stable-security; urgency=high
  * Non-maintainer upload for the Security Team.
  * Fix integer overflow vulnerability [gopherd/command.c, CAN-2004-0560]
  * Fix format string vulnerability [gopherd/ftp.c, CAN-2004-0561]
  * Sponsored by Martin Schulze <joey@debian.org>. Thank you!


stable/main/binary-sparc/libc6-dev-sparc64_2.2.5-11.8_sparc.deb
stable/main/binary-sparc/libc6-dev_2.2.5-11.8_sparc.deb
stable/main/binary-sparc/nscd_2.2.5-11.8_sparc.deb
stable/main/binary-sparc/libc6_2.2.5-11.8_sparc.deb
stable/main/binary-sparc/libc6-prof_2.2.5-11.8_sparc.deb
stable/main/binary-sparc/libc6-dbg_2.2.5-11.8_sparc.deb
stable/main/binary-sparc/libc6-sparc64_2.2.5-11.8_sparc.deb
stable/main/binary-sparc/libc6-pic_2.2.5-11.8_sparc.deb
glibc (2.2.5-11.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure
    temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968,
    debian/patches/CAN-2004-0968_tempfile.dpatch]
  * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the
    buildd tends to install the wrong package


stable/main/binary-s390/libc6-dbg_2.2.5-11.8_s390.deb
stable/main/binary-s390/libc6-pic_2.2.5-11.8_s390.deb
stable/main/binary-s390/libc6-prof_2.2.5-11.8_s390.deb
stable/main/binary-s390/libc6-dev_2.2.5-11.8_s390.deb
stable/main/binary-s390/nscd_2.2.5-11.8_s390.deb
stable/main/binary-s390/libc6_2.2.5-11.8_s390.deb
glibc (2.2.5-11.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure
    temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968,
    debian/patches/CAN-2004-0968_tempfile.dpatch]
  * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the
    buildd tends to install the wrong package


stable/main/binary-powerpc/libc6-dev_2.2.5-11.8_powerpc.deb
stable/main/binary-powerpc/libc6-pic_2.2.5-11.8_powerpc.deb
stable/main/binary-powerpc/libc6-dbg_2.2.5-11.8_powerpc.deb
stable/main/binary-powerpc/libc6-prof_2.2.5-11.8_powerpc.deb
stable/main/binary-powerpc/libc6_2.2.5-11.8_powerpc.deb
stable/main/binary-powerpc/nscd_2.2.5-11.8_powerpc.deb
glibc (2.2.5-11.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure
    temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968,
    debian/patches/CAN-2004-0968_tempfile.dpatch]
  * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the
    buildd tends to install the wrong package


stable/main/binary-mipsel/libc6-dev_2.2.5-11.8_mipsel.deb
stable/main/binary-mipsel/libc6-pic_2.2.5-11.8_mipsel.deb
stable/main/binary-mipsel/libc6_2.2.5-11.8_mipsel.deb
stable/main/binary-mipsel/nscd_2.2.5-11.8_mipsel.deb
stable/main/binary-mipsel/libc6-dbg_2.2.5-11.8_mipsel.deb
stable/main/binary-mipsel/libc6-prof_2.2.5-11.8_mipsel.deb
glibc (2.2.5-11.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure
    temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968,
    debian/patches/CAN-2004-0968_tempfile.dpatch]
  * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the
    buildd tends to install the wrong package


stable/main/binary-mips/libc6-dev_2.2.5-11.8_mips.deb
stable/main/binary-mips/libc6-pic_2.2.5-11.8_mips.deb
stable/main/binary-mips/libc6-dbg_2.2.5-11.8_mips.deb
stable/main/binary-mips/nscd_2.2.5-11.8_mips.deb
stable/main/binary-mips/libc6_2.2.5-11.8_mips.deb
stable/main/binary-mips/libc6-prof_2.2.5-11.8_mips.deb
glibc (2.2.5-11.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure
    temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968,
    debian/patches/CAN-2004-0968_tempfile.dpatch]
  * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the
    buildd tends to install the wrong package


stable/main/binary-m68k/nscd_2.2.5-11.8_m68k.deb
stable/main/binary-m68k/libc6-dev_2.2.5-11.8_m68k.deb
stable/main/binary-m68k/libc6_2.2.5-11.8_m68k.deb
stable/main/binary-m68k/libc6-pic_2.2.5-11.8_m68k.deb
stable/main/binary-m68k/libc6-dbg_2.2.5-11.8_m68k.deb
stable/main/binary-m68k/libc6-prof_2.2.5-11.8_m68k.deb
glibc (2.2.5-11.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure
    temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968,
    debian/patches/CAN-2004-0968_tempfile.dpatch]
  * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the
    buildd tends to install the wrong package


stable/main/binary-ia64/libc6.1-dev_2.2.5-11.8_ia64.deb
stable/main/binary-ia64/libc6.1_2.2.5-11.8_ia64.deb
stable/main/binary-ia64/libc6.1-dbg_2.2.5-11.8_ia64.deb
stable/main/binary-ia64/libc6.1-pic_2.2.5-11.8_ia64.deb
stable/main/binary-ia64/nscd_2.2.5-11.8_ia64.deb
stable/main/binary-ia64/libc6.1-prof_2.2.5-11.8_ia64.deb
glibc (2.2.5-11.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure
    temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968,
    debian/patches/CAN-2004-0968_tempfile.dpatch]
  * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the
    buildd tends to install the wrong package


stable/main/binary-hppa/libc6_2.2.5-11.8_hppa.deb
stable/main/binary-hppa/libc6-dev_2.2.5-11.8_hppa.deb
stable/main/binary-hppa/libc6-prof_2.2.5-11.8_hppa.deb
stable/main/binary-hppa/libc6-pic_2.2.5-11.8_hppa.deb
stable/main/binary-hppa/libc6-dbg_2.2.5-11.8_hppa.deb
stable/main/binary-hppa/nscd_2.2.5-11.8_hppa.deb
glibc (2.2.5-11.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure
    temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968,
    debian/patches/CAN-2004-0968_tempfile.dpatch]
  * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the
    buildd tends to install the wrong package


stable/main/binary-arm/libc6-prof_2.2.5-11.8_arm.deb
stable/main/binary-arm/libc6_2.2.5-11.8_arm.deb
stable/main/binary-arm/libc6-dbg_2.2.5-11.8_arm.deb
stable/main/binary-arm/nscd_2.2.5-11.8_arm.deb
stable/main/binary-arm/libc6-pic_2.2.5-11.8_arm.deb
stable/main/binary-arm/libc6-dev_2.2.5-11.8_arm.deb
glibc (2.2.5-11.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure
    temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968,
    debian/patches/CAN-2004-0968_tempfile.dpatch]
  * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the
    buildd tends to install the wrong package


stable/main/binary-alpha/libc6.1-dev_2.2.5-11.8_alpha.deb
stable/main/binary-alpha/libc6.1-prof_2.2.5-11.8_alpha.deb
stable/main/binary-alpha/nscd_2.2.5-11.8_alpha.deb
stable/main/binary-alpha/libc6.1-dbg_2.2.5-11.8_alpha.deb
stable/main/binary-alpha/libc6.1-pic_2.2.5-11.8_alpha.deb
stable/main/binary-alpha/libc6.1_2.2.5-11.8_alpha.deb
glibc (2.2.5-11.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure
    temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968,
    debian/patches/CAN-2004-0968_tempfile.dpatch]
  * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the
    buildd tends to install the wrong package


stable/main/binary-i386/libc6-prof_2.2.5-11.8_i386.deb
stable/main/binary-all/locales_2.2.5-11.8_all.deb
stable/main/binary-i386/libc6_2.2.5-11.8_i386.deb
stable/main/binary-i386/libc6-pic_2.2.5-11.8_i386.deb
stable/main/binary-i386/libc6-dev_2.2.5-11.8_i386.deb
stable/main/source/glibc_2.2.5-11.8.dsc
stable/main/source/glibc_2.2.5-11.8.diff.gz
stable/main/binary-all/glibc-doc_2.2.5-11.8_all.deb
stable/main/binary-i386/nscd_2.2.5-11.8_i386.deb
stable/main/binary-i386/libc6-dbg_2.2.5-11.8_i386.deb
glibc (2.2.5-11.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches Owl (glibcbug) and Trustix (catchsegv) to fix insecure
    temporary files [glibcbug.in, debug/catchsegv.sh, CAN-2004-0968,
    debian/patches/CAN-2004-0968_tempfile.dpatch]
  * Added explicit dependency to kernel-headers-2.4.17 for S/390 since the
    buildd tends to install the wrong package


stable/main/binary-sparc/gftp-common_2.0.11-1woody1_sparc.deb
stable/main/binary-sparc/gftp_2.0.11-1woody1_sparc.deb
stable/main/binary-sparc/gftp-text_2.0.11-1woody1_sparc.deb
stable/main/binary-sparc/gftp-gtk_2.0.11-1woody1_sparc.deb
gftp (2.0.11-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix a directory traversal
    [lib/protocols.c, CAN-2005-0372]


stable/main/binary-s390/gftp-common_2.0.11-1woody1_s390.deb
stable/main/binary-s390/gftp-text_2.0.11-1woody1_s390.deb
stable/main/binary-s390/gftp_2.0.11-1woody1_s390.deb
stable/main/binary-s390/gftp-gtk_2.0.11-1woody1_s390.deb
gftp (2.0.11-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix a directory traversal
    [lib/protocols.c, CAN-2005-0372]


stable/main/binary-powerpc/gftp_2.0.11-1woody1_powerpc.deb
stable/main/binary-powerpc/gftp-gtk_2.0.11-1woody1_powerpc.deb
stable/main/binary-powerpc/gftp-text_2.0.11-1woody1_powerpc.deb
stable/main/binary-powerpc/gftp-common_2.0.11-1woody1_powerpc.deb
gftp (2.0.11-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix a directory traversal
    [lib/protocols.c, CAN-2005-0372]


stable/main/binary-mips/gftp-gtk_2.0.11-1woody1_mips.deb
stable/main/binary-mips/gftp_2.0.11-1woody1_mips.deb
stable/main/binary-mips/gftp-text_2.0.11-1woody1_mips.deb
stable/main/binary-mips/gftp-common_2.0.11-1woody1_mips.deb
gftp (2.0.11-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix a directory traversal
    [lib/protocols.c, CAN-2005-0372]


stable/main/binary-m68k/gftp-gtk_2.0.11-1woody1_m68k.deb
stable/main/binary-m68k/gftp-common_2.0.11-1woody1_m68k.deb
stable/main/binary-m68k/gftp-text_2.0.11-1woody1_m68k.deb
stable/main/binary-m68k/gftp_2.0.11-1woody1_m68k.deb
gftp (2.0.11-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix a directory traversal
    [lib/protocols.c, CAN-2005-0372]


stable/main/binary-ia64/gftp-gtk_2.0.11-1woody1_ia64.deb
stable/main/binary-ia64/gftp_2.0.11-1woody1_ia64.deb
stable/main/binary-ia64/gftp-text_2.0.11-1woody1_ia64.deb
stable/main/binary-ia64/gftp-common_2.0.11-1woody1_ia64.deb
gftp (2.0.11-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix a directory traversal
    [lib/protocols.c, CAN-2005-0372]


stable/main/binary-i386/gftp-common_2.0.11-1woody1_i386.deb
stable/main/binary-i386/gftp_2.0.11-1woody1_i386.deb
stable/main/binary-i386/gftp-text_2.0.11-1woody1_i386.deb
stable/main/binary-i386/gftp-gtk_2.0.11-1woody1_i386.deb
gftp (2.0.11-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix a directory traversal
    [lib/protocols.c, CAN-2005-0372]


stable/main/binary-hppa/gftp_2.0.11-1woody1_hppa.deb
stable/main/binary-hppa/gftp-common_2.0.11-1woody1_hppa.deb
stable/main/binary-hppa/gftp-gtk_2.0.11-1woody1_hppa.deb
stable/main/binary-hppa/gftp-text_2.0.11-1woody1_hppa.deb
gftp (2.0.11-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix a directory traversal
    [lib/protocols.c, CAN-2005-0372]


stable/main/binary-arm/gftp-gtk_2.0.11-1woody1_arm.deb
stable/main/binary-arm/gftp-text_2.0.11-1woody1_arm.deb
stable/main/binary-arm/gftp_2.0.11-1woody1_arm.deb
stable/main/binary-arm/gftp-common_2.0.11-1woody1_arm.deb
gftp (2.0.11-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix a directory traversal
    [lib/protocols.c, CAN-2005-0372]


stable/main/binary-alpha/gftp-common_2.0.11-1woody1_alpha.deb
stable/main/binary-alpha/gftp-text_2.0.11-1woody1_alpha.deb
stable/main/binary-alpha/gftp_2.0.11-1woody1_alpha.deb
stable/main/binary-alpha/gftp-gtk_2.0.11-1woody1_alpha.deb
gftp (2.0.11-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix a directory traversal
    [lib/protocols.c, CAN-2005-0372]


stable/main/binary-mipsel/gftp-common_2.0.11-1woody1_mipsel.deb
stable/main/binary-mipsel/gftp-text_2.0.11-1woody1_mipsel.deb
stable/main/binary-mipsel/gftp_2.0.11-1woody1_mipsel.deb
stable/main/source/gftp_2.0.11-1woody1.dsc
stable/main/binary-mipsel/gftp-gtk_2.0.11-1woody1_mipsel.deb
stable/main/source/gftp_2.0.11-1woody1.diff.gz
gftp (2.0.11-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream patch to fix a directory traversal
    [lib/protocols.c, CAN-2005-0372]


stable/main/binary-sparc/gobjc-2.95_2.95.4-11woody1_sparc.deb
stable/main/binary-sparc/libstdc++2.10-dev_2.95.4-11woody1_sparc.deb
stable/main/binary-sparc/g++-2.95_2.95.4-11woody1_sparc.deb
stable/main/binary-sparc/chill-2.95_2.95.4-11woody1_sparc.deb
stable/main/binary-sparc/cpp-2.95_2.95.4-11woody1_sparc.deb
stable/main/binary-sparc/libstdc++2.10-glibc2.2_2.95.4-11woody1_sparc.deb
stable/main/binary-sparc/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_sparc.deb
stable/main/binary-sparc/gpc-2.95_2.95.4-11woody1_sparc.deb
stable/main/binary-sparc/g77-2.95_2.95.4-11woody1_sparc.deb
stable/main/binary-sparc/libg++2.8.1.3-dbg_2.95.4-11woody1_sparc.deb
stable/main/binary-sparc/gcc-2.95_2.95.4-11woody1_sparc.deb
stable/main/binary-sparc/libg++2.8.1.3-dev_2.95.4-11woody1_sparc.deb
stable/main/binary-sparc/protoize-2.95_2.95.4-11woody1_sparc.deb
stable/main/binary-sparc/libstdc++2.10-dbg_2.95.4-11woody1_sparc.deb
gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low
  * Upload to woody-proposed-updates:
    - Fix profiling for arm.
    - Fix internal compiler errors on s390.
    - Update Pascal release candidate 7 to final release.
    - Build the protoize-2.95 package again just in case that somebody
      relies on the protoize-2.95 and unprotoize-2.95 binaries.
    - No other changes to other compilers and architectures.


stable/main/binary-mipsel/g77-2.95_2.95.4-11woody1_mipsel.deb
stable/main/binary-mipsel/protoize-2.95_2.95.4-11woody1_mipsel.deb
stable/main/binary-mipsel/libstdc++2.10-glibc2.2_2.95.4-11woody1_mipsel.deb
stable/main/binary-mipsel/chill-2.95_2.95.4-11woody1_mipsel.deb
stable/main/binary-mipsel/gobjc-2.95_2.95.4-11woody1_mipsel.deb
stable/main/binary-mipsel/libstdc++2.10-dbg_2.95.4-11woody1_mipsel.deb
stable/main/binary-mipsel/cpp-2.95_2.95.4-11woody1_mipsel.deb
stable/main/binary-mipsel/gpc-2.95_2.95.4-11woody1_mipsel.deb
stable/main/binary-mipsel/gcc-2.95_2.95.4-11woody1_mipsel.deb
stable/main/binary-mipsel/libg++2.8.1.3-dev_2.95.4-11woody1_mipsel.deb
stable/main/binary-mipsel/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_mipsel.deb
stable/main/binary-mipsel/libstdc++2.10-dev_2.95.4-11woody1_mipsel.deb
stable/main/binary-mipsel/libg++2.8.1.3-dbg_2.95.4-11woody1_mipsel.deb
stable/main/binary-mipsel/g++-2.95_2.95.4-11woody1_mipsel.deb
gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low
  * Upload to woody-proposed-updates:
    - Fix profiling for arm.
    - Fix internal compiler errors on s390.
    - Update Pascal release candidate 7 to final release.
    - Build the protoize-2.95 package again just in case that somebody
      relies on the protoize-2.95 and unprotoize-2.95 binaries.
    - No other changes to other compilers and architectures.


stable/main/binary-mips/cpp-2.95_2.95.4-11woody1_mips.deb
stable/main/binary-mips/libstdc++2.10-dev_2.95.4-11woody1_mips.deb
stable/main/binary-mips/chill-2.95_2.95.4-11woody1_mips.deb
stable/main/binary-mips/gcc-2.95_2.95.4-11woody1_mips.deb
stable/main/binary-mips/protoize-2.95_2.95.4-11woody1_mips.deb
stable/main/binary-mips/libstdc++2.10-dbg_2.95.4-11woody1_mips.deb
stable/main/binary-mips/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_mips.deb
stable/main/binary-mips/gobjc-2.95_2.95.4-11woody1_mips.deb
stable/main/binary-mips/libstdc++2.10-glibc2.2_2.95.4-11woody1_mips.deb
stable/main/binary-mips/gpc-2.95_2.95.4-11woody1_mips.deb
stable/main/binary-mips/g77-2.95_2.95.4-11woody1_mips.deb
stable/main/binary-mips/libg++2.8.1.3-dev_2.95.4-11woody1_mips.deb
stable/main/binary-mips/g++-2.95_2.95.4-11woody1_mips.deb
stable/main/binary-mips/libg++2.8.1.3-dbg_2.95.4-11woody1_mips.deb
gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low
  * Upload to woody-proposed-updates:
    - Fix profiling for arm.
    - Fix internal compiler errors on s390.
    - Update Pascal release candidate 7 to final release.
    - Build the protoize-2.95 package again just in case that somebody
      relies on the protoize-2.95 and unprotoize-2.95 binaries.
    - No other changes to other compilers and architectures.


stable/main/source/gatos_0.0.5-6woody3.dsc
stable/main/source/gatos_0.0.5-6woody3.diff.gz
stable/main/binary-i386/gatos_0.0.5-6woody3_i386.deb
stable/main/binary-i386/libgatos0_0.0.5-6woody3_i386.deb
stable/main/binary-i386/libgatos-dev_0.0.5-6woody3_i386.deb
gatos (0.0.5-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected size calculation to fix a buffer overflow [src/xutils.c,
    CAN-2005-0016]


stable/main/source/gallery_1.2.5-8woody3.dsc
stable/main/binary-all/gallery_1.2.5-8woody3_all.deb
stable/main/source/gallery_1.2.5-8woody3.diff.gz
gallery (1.2.5-8woody3) stable-security; urgency=high
  * Non-maintainer upload for the Security Team
  * Fix cross-site scripting vulnerability in include parameter
    [index.php, CAN-2004-1106]
  * Added dbhost and GLOBALS to sensitive list [init.php, CAN]
  * Check for imported variables via $_REQUEST and $_FILES as well
    [init.php, CVE-NOMATCH]


stable/main/binary-sparc/f2c_20010821-3.1_sparc.deb
f2c (20010821-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Hacked debian/rules so that additional patches can be applied, since
    the package itself does check whether it's using the pristine source
  * Corrected creating of temporary files f2c [src/sysdep.c,
    patches/patch.CAN-2005-0017.f2c, CAN-2005-0017]
  * Added patch by Javier Fernández-Sanguino Peña to fix temporary file
    problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018]
  * Surgically removed xsum comparison since it prevents security updates
    from being applied [src/makefile]


stable/main/binary-s390/f2c_20010821-3.1_s390.deb
f2c (20010821-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Hacked debian/rules so that additional patches can be applied, since
    the package itself does check whether it's using the pristine source
  * Corrected creating of temporary files f2c [src/sysdep.c,
    patches/patch.CAN-2005-0017.f2c, CAN-2005-0017]
  * Added patch by Javier Fernández-Sanguino Peña to fix temporary file
    problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018]
  * Surgically removed xsum comparison since it prevents security updates
    from being applied [src/makefile]


stable/main/binary-powerpc/f2c_20010821-3.1_powerpc.deb
f2c (20010821-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Hacked debian/rules so that additional patches can be applied, since
    the package itself does check whether it's using the pristine source
  * Corrected creating of temporary files f2c [src/sysdep.c,
    patches/patch.CAN-2005-0017.f2c, CAN-2005-0017]
  * Added patch by Javier Fernández-Sanguino Peña to fix temporary file
    problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018]
  * Surgically removed xsum comparison since it prevents security updates
    from being applied [src/makefile]


stable/main/binary-mips/f2c_20010821-3.1_mips.deb
f2c (20010821-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Hacked debian/rules so that additional patches can be applied, since
    the package itself does check whether it's using the pristine source
  * Corrected creating of temporary files f2c [src/sysdep.c,
    patches/patch.CAN-2005-0017.f2c, CAN-2005-0017]
  * Added patch by Javier Fernández-Sanguino Peña to fix temporary file
    problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018]
  * Surgically removed xsum comparison since it prevents security updates
    from being applied [src/makefile]


stable/main/binary-m68k/f2c_20010821-3.1_m68k.deb
f2c (20010821-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Hacked debian/rules so that additional patches can be applied, since
    the package itself does check whether it's using the pristine source
  * Corrected creating of temporary files f2c [src/sysdep.c,
    patches/patch.CAN-2005-0017.f2c, CAN-2005-0017]
  * Added patch by Javier Fernández-Sanguino Peña to fix temporary file
    problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018]
  * Surgically removed xsum comparison since it prevents security updates
    from being applied [src/makefile]


stable/main/binary-ia64/f2c_20010821-3.1_ia64.deb
f2c (20010821-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Hacked debian/rules so that additional patches can be applied, since
    the package itself does check whether it's using the pristine source
  * Corrected creating of temporary files f2c [src/sysdep.c,
    patches/patch.CAN-2005-0017.f2c, CAN-2005-0017]
  * Added patch by Javier Fernández-Sanguino Peña to fix temporary file
    problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018]
  * Surgically removed xsum comparison since it prevents security updates
    from being applied [src/makefile]


stable/main/binary-i386/f2c_20010821-3.1_i386.deb
f2c (20010821-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Hacked debian/rules so that additional patches can be applied, since
    the package itself does check whether it's using the pristine source
  * Corrected creating of temporary files f2c [src/sysdep.c,
    patches/patch.CAN-2005-0017.f2c, CAN-2005-0017]
  * Added patch by Javier Fernández-Sanguino Peña to fix temporary file
    problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018]
  * Surgically removed xsum comparison since it prevents security updates
    from being applied [src/makefile]


stable/main/binary-hppa/f2c_20010821-3.1_hppa.deb
f2c (20010821-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Hacked debian/rules so that additional patches can be applied, since
    the package itself does check whether it's using the pristine source
  * Corrected creating of temporary files f2c [src/sysdep.c,
    patches/patch.CAN-2005-0017.f2c, CAN-2005-0017]
  * Added patch by Javier Fernández-Sanguino Peña to fix temporary file
    problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018]
  * Surgically removed xsum comparison since it prevents security updates
    from being applied [src/makefile]


stable/main/binary-arm/f2c_20010821-3.1_arm.deb
f2c (20010821-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Hacked debian/rules so that additional patches can be applied, since
    the package itself does check whether it's using the pristine source
  * Corrected creating of temporary files f2c [src/sysdep.c,
    patches/patch.CAN-2005-0017.f2c, CAN-2005-0017]
  * Added patch by Javier Fernández-Sanguino Peña to fix temporary file
    problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018]
  * Surgically removed xsum comparison since it prevents security updates
    from being applied [src/makefile]


stable/main/binary-alpha/f2c_20010821-3.1_alpha.deb
f2c (20010821-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Hacked debian/rules so that additional patches can be applied, since
    the package itself does check whether it's using the pristine source
  * Corrected creating of temporary files f2c [src/sysdep.c,
    patches/patch.CAN-2005-0017.f2c, CAN-2005-0017]
  * Added patch by Javier Fernández-Sanguino Peña to fix temporary file
    problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018]
  * Surgically removed xsum comparison since it prevents security updates
    from being applied [src/makefile]


stable/main/source/f2c_20010821-3.1.diff.gz
stable/main/binary-mipsel/f2c_20010821-3.1_mipsel.deb
stable/main/source/f2c_20010821-3.1.dsc
f2c (20010821-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Hacked debian/rules so that additional patches can be applied, since
    the package itself does check whether it's using the pristine source
  * Corrected creating of temporary files f2c [src/sysdep.c,
    patches/patch.CAN-2005-0017.f2c, CAN-2005-0017]
  * Added patch by Javier Fernández-Sanguino Peña to fix temporary file
    problem in fc [fc, patches/patch.CAN-2005-0018.f2c, CAN-2005-0018]
  * Surgically removed xsum comparison since it prevents security updates
    from being applied [src/makefile]


stable/main/binary-sparc/exim_3.35-1woody4_sparc.deb
stable/main/binary-sparc/eximon_3.35-1woody4_sparc.deb
exim (3.35-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow in the IPv6 address
    handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021]


stable/main/binary-s390/eximon_3.35-1woody4_s390.deb
stable/main/binary-s390/exim_3.35-1woody4_s390.deb
exim (3.35-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow in the IPv6 address
    handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021]


stable/main/binary-powerpc/exim_3.35-1woody4_powerpc.deb
stable/main/binary-powerpc/eximon_3.35-1woody4_powerpc.deb
exim (3.35-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow in the IPv6 address
    handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021]


stable/main/binary-mips/eximon_3.35-1woody4_mips.deb
stable/main/binary-mips/exim_3.35-1woody4_mips.deb
exim (3.35-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow in the IPv6 address
    handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021]


stable/main/binary-m68k/exim_3.35-1woody4_m68k.deb
stable/main/binary-m68k/eximon_3.35-1woody4_m68k.deb
exim (3.35-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow in the IPv6 address
    handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021]


stable/main/binary-ia64/exim_3.35-1woody4_ia64.deb
stable/main/binary-ia64/eximon_3.35-1woody4_ia64.deb
exim (3.35-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow in the IPv6 address
    handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021]


stable/main/binary-i386/exim_3.35-1woody4_i386.deb
stable/main/binary-i386/eximon_3.35-1woody4_i386.deb
exim (3.35-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow in the IPv6 address
    handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021]


stable/main/binary-hppa/eximon_3.35-1woody4_hppa.deb
stable/main/binary-hppa/exim_3.35-1woody4_hppa.deb
exim (3.35-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow in the IPv6 address
    handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021]


stable/main/binary-arm/eximon_3.35-1woody4_arm.deb
stable/main/binary-arm/exim_3.35-1woody4_arm.deb
exim (3.35-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow in the IPv6 address
    handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021]


stable/main/binary-alpha/eximon_3.35-1woody4_alpha.deb
stable/main/binary-alpha/exim_3.35-1woody4_alpha.deb
exim (3.35-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow in the IPv6 address
    handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021]


stable/main/source/exim_3.35-1woody4.diff.gz
stable/main/source/exim_3.35-1woody4.dsc
stable/main/binary-mipsel/exim_3.35-1woody4_mipsel.deb
stable/main/binary-mipsel/eximon_3.35-1woody4_mipsel.deb
exim (3.35-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a buffer overflow in the IPv6 address
    handling code [src/host.c, src/lookups/dnsdb.c, CAN-2005-0021]


stable/main/binary-sparc/libcamel-dev_1.0.5-1woody2_sparc.deb
stable/main/binary-sparc/evolution_1.0.5-1woody2_sparc.deb
stable/main/binary-sparc/libcamel0_1.0.5-1woody2_sparc.deb
evolution (1.0.5-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Max Vozeler to fix integer overflow
    [evolution-1.0.5/camel/camel-lock-helper.c, CAN-2005-0102]
  * Non-changes buildd so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-s390/evolution_1.0.5-1woody2_s390.deb
stable/main/binary-s390/libcamel0_1.0.5-1woody2_s390.deb
stable/main/binary-s390/libcamel-dev_1.0.5-1woody2_s390.deb
evolution (1.0.5-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Max Vozeler to fix integer overflow
    [evolution-1.0.5/camel/camel-lock-helper.c, CAN-2005-0102]
  * Non-changes buildd so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-powerpc/evolution_1.0.5-1woody2_powerpc.deb
stable/main/binary-powerpc/libcamel-dev_1.0.5-1woody2_powerpc.deb
stable/main/binary-powerpc/libcamel0_1.0.5-1woody2_powerpc.deb
evolution (1.0.5-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Max Vozeler to fix integer overflow
    [evolution-1.0.5/camel/camel-lock-helper.c, CAN-2005-0102]
  * Non-changes buildd so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-m68k/evolution_1.0.5-1woody2_m68k.deb
stable/main/binary-m68k/libcamel-dev_1.0.5-1woody2_m68k.deb
stable/main/binary-m68k/libcamel0_1.0.5-1woody2_m68k.deb
evolution (1.0.5-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Max Vozeler to fix integer overflow
    [evolution-1.0.5/camel/camel-lock-helper.c, CAN-2005-0102]
  * Non-changes buildd so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-i386/libcamel-dev_1.0.5-1woody2_i386.deb
stable/main/binary-i386/libcamel0_1.0.5-1woody2_i386.deb
stable/main/binary-i386/evolution_1.0.5-1woody2_i386.deb
evolution (1.0.5-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Max Vozeler to fix integer overflow
    [evolution-1.0.5/camel/camel-lock-helper.c, CAN-2005-0102]
  * Non-changes buildd so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-arm/libcamel0_1.0.5-1woody2_arm.deb
stable/main/binary-arm/evolution_1.0.5-1woody2_arm.deb
stable/main/binary-arm/libcamel-dev_1.0.5-1woody2_arm.deb
evolution (1.0.5-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Max Vozeler to fix integer overflow
    [evolution-1.0.5/camel/camel-lock-helper.c, CAN-2005-0102]
  * Non-changes buildd so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-alpha/evolution_1.0.5-1woody2_alpha.deb
stable/main/binary-alpha/libcamel-dev_1.0.5-1woody2_alpha.deb
stable/main/binary-alpha/libcamel0_1.0.5-1woody2_alpha.deb
evolution (1.0.5-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Max Vozeler to fix integer overflow
    [evolution-1.0.5/camel/camel-lock-helper.c, CAN-2005-0102]
  * Non-changes buildd so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-ia64/libcamel0_1.0.5-1woody2_ia64.deb
stable/main/source/evolution_1.0.5-1woody2.dsc
stable/main/binary-ia64/evolution_1.0.5-1woody2_ia64.deb
stable/main/source/evolution_1.0.5-1woody2.diff.gz
stable/main/binary-ia64/libcamel-dev_1.0.5-1woody2_ia64.deb
evolution (1.0.5-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Max Vozeler to fix integer overflow
    [evolution-1.0.5/camel/camel-lock-helper.c, CAN-2005-0102]
  * Non-changes buildd so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-sparc/ethereal_0.9.4-1woody11_sparc.deb
stable/main/binary-sparc/ethereal-dev_0.9.4-1woody11_sparc.deb
stable/main/binary-sparc/ethereal-common_0.9.4-1woody11_sparc.deb
stable/main/binary-sparc/tethereal_0.9.4-1woody11_sparc.deb
ethereal (0.9.4-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the backported patch to fix buffer overflow in X11 dissector
    [packet-x11.c, CAN-2005-0084]


stable/main/binary-s390/ethereal_0.9.4-1woody11_s390.deb
stable/main/binary-s390/ethereal-common_0.9.4-1woody11_s390.deb
stable/main/binary-s390/ethereal-dev_0.9.4-1woody11_s390.deb
stable/main/binary-s390/tethereal_0.9.4-1woody11_s390.deb
ethereal (0.9.4-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the backported patch to fix buffer overflow in X11 dissector
    [packet-x11.c, CAN-2005-0084]


stable/main/binary-powerpc/ethereal_0.9.4-1woody11_powerpc.deb
stable/main/binary-powerpc/ethereal-dev_0.9.4-1woody11_powerpc.deb
stable/main/binary-powerpc/tethereal_0.9.4-1woody11_powerpc.deb
stable/main/binary-powerpc/ethereal-common_0.9.4-1woody11_powerpc.deb
ethereal (0.9.4-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the backported patch to fix buffer overflow in X11 dissector
    [packet-x11.c, CAN-2005-0084]


stable/main/binary-mipsel/ethereal-common_0.9.4-1woody11_mipsel.deb
stable/main/binary-mipsel/tethereal_0.9.4-1woody11_mipsel.deb
stable/main/binary-mipsel/ethereal_0.9.4-1woody11_mipsel.deb
stable/main/binary-mipsel/ethereal-dev_0.9.4-1woody11_mipsel.deb
ethereal (0.9.4-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the backported patch to fix buffer overflow in X11 dissector
    [packet-x11.c, CAN-2005-0084]


stable/main/binary-mips/ethereal_0.9.4-1woody11_mips.deb
stable/main/binary-mips/ethereal-common_0.9.4-1woody11_mips.deb
stable/main/binary-mips/ethereal-dev_0.9.4-1woody11_mips.deb
stable/main/binary-mips/tethereal_0.9.4-1woody11_mips.deb
ethereal (0.9.4-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the backported patch to fix buffer overflow in X11 dissector
    [packet-x11.c, CAN-2005-0084]


stable/main/binary-m68k/ethereal_0.9.4-1woody11_m68k.deb
stable/main/binary-m68k/ethereal-dev_0.9.4-1woody11_m68k.deb
stable/main/binary-m68k/tethereal_0.9.4-1woody11_m68k.deb
stable/main/binary-m68k/ethereal-common_0.9.4-1woody11_m68k.deb
ethereal (0.9.4-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the backported patch to fix buffer overflow in X11 dissector
    [packet-x11.c, CAN-2005-0084]


stable/main/binary-ia64/ethereal-common_0.9.4-1woody11_ia64.deb
stable/main/binary-ia64/tethereal_0.9.4-1woody11_ia64.deb
stable/main/binary-ia64/ethereal-dev_0.9.4-1woody11_ia64.deb
stable/main/binary-ia64/ethereal_0.9.4-1woody11_ia64.deb
ethereal (0.9.4-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the backported patch to fix buffer overflow in X11 dissector
    [packet-x11.c, CAN-2005-0084]


stable/main/binary-hppa/ethereal_0.9.4-1woody11_hppa.deb
stable/main/binary-hppa/ethereal-common_0.9.4-1woody11_hppa.deb
stable/main/binary-hppa/ethereal-dev_0.9.4-1woody11_hppa.deb
stable/main/binary-hppa/tethereal_0.9.4-1woody11_hppa.deb
ethereal (0.9.4-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the backported patch to fix buffer overflow in X11 dissector
    [packet-x11.c, CAN-2005-0084]


stable/main/binary-arm/ethereal-common_0.9.4-1woody11_arm.deb
stable/main/binary-arm/ethereal-dev_0.9.4-1woody11_arm.deb
stable/main/binary-arm/tethereal_0.9.4-1woody11_arm.deb
stable/main/binary-arm/ethereal_0.9.4-1woody11_arm.deb
ethereal (0.9.4-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the backported patch to fix buffer overflow in X11 dissector
    [packet-x11.c, CAN-2005-0084]


stable/main/binary-alpha/ethereal-dev_0.9.4-1woody11_alpha.deb
stable/main/binary-alpha/ethereal_0.9.4-1woody11_alpha.deb
stable/main/binary-alpha/tethereal_0.9.4-1woody11_alpha.deb
stable/main/binary-alpha/ethereal-common_0.9.4-1woody11_alpha.deb
ethereal (0.9.4-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the backported patch to fix buffer overflow in X11 dissector
    [packet-x11.c, CAN-2005-0084]


stable/main/binary-i386/ethereal-common_0.9.4-1woody11_i386.deb
stable/main/binary-i386/ethereal_0.9.4-1woody11_i386.deb
stable/main/binary-i386/ethereal-dev_0.9.4-1woody11_i386.deb
stable/main/binary-i386/tethereal_0.9.4-1woody11_i386.deb
stable/main/source/ethereal_0.9.4-1woody11.diff.gz
stable/main/source/ethereal_0.9.4-1woody11.dsc
ethereal (0.9.4-1woody11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the backported patch to fix buffer overflow in X11 dissector
    [packet-x11.c, CAN-2005-0084]


stable/main/binary-sparc/enscript_1.6.3-1.3_sparc.deb
enscript (1.6.3-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186]


stable/main/binary-s390/enscript_1.6.3-1.3_s390.deb
enscript (1.6.3-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186]


stable/main/binary-powerpc/enscript_1.6.3-1.3_powerpc.deb
enscript (1.6.3-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186]


stable/main/binary-mips/enscript_1.6.3-1.3_mips.deb
enscript (1.6.3-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186]


stable/main/binary-m68k/enscript_1.6.3-1.3_m68k.deb
enscript (1.6.3-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186]


stable/main/binary-ia64/enscript_1.6.3-1.3_ia64.deb
enscript (1.6.3-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186]


stable/main/binary-i386/enscript_1.6.3-1.3_i386.deb
enscript (1.6.3-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186]


stable/main/binary-hppa/enscript_1.6.3-1.3_hppa.deb
enscript (1.6.3-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186]


stable/main/binary-arm/enscript_1.6.3-1.3_arm.deb
enscript (1.6.3-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186]


stable/main/binary-alpha/enscript_1.6.3-1.3_alpha.deb
enscript (1.6.3-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186]


stable/main/binary-mipsel/enscript_1.6.3-1.3_mipsel.deb
stable/main/source/enscript_1.6.3-1.3.diff.gz
stable/main/source/enscript_1.6.3-1.3.dsc
enscript (1.6.3-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted bogus change to fix buffer overflow [src/util.c, CAN-2004-1186]


stable/main/binary-sparc/emacs21_21.2-1woody3_sparc.deb
emacs21 (21.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100]


stable/main/binary-s390/emacs21_21.2-1woody3_s390.deb
emacs21 (21.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100]


stable/main/binary-powerpc/emacs21_21.2-1woody3_powerpc.deb
emacs21 (21.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100]


stable/main/binary-mipsel/emacs21_21.2-1woody3_mipsel.deb
emacs21 (21.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100]


stable/main/binary-mips/emacs21_21.2-1woody3_mips.deb
emacs21 (21.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100]


stable/main/binary-m68k/emacs21_21.2-1woody3_m68k.deb
emacs21 (21.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100]


stable/main/binary-i386/emacs21_21.2-1woody3_i386.deb
emacs21 (21.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100]


stable/main/binary-hppa/emacs21_21.2-1woody3_hppa.deb
emacs21 (21.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100]


stable/main/binary-arm/emacs21_21.2-1woody3_arm.deb
emacs21 (21.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100]


stable/main/binary-alpha/emacs21_21.2-1woody3_alpha.deb
emacs21 (21.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100]


stable/main/source/emacs21_21.2-1woody3.dsc
stable/main/binary-all/emacs21-el_21.2-1woody3_all.deb
stable/main/binary-ia64/emacs21_21.2-1woody3_ia64.deb
stable/main/source/emacs21_21.2-1woody3.diff.gz
emacs21 (21.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the security patch [lib-src/movemail.c, CAN-2005-0100]


stable/main/binary-sparc/emacs20_20.7-13.3_sparc.deb
emacs20 (20.7-13.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-s390/emacs20_20.7-13.3_s390.deb
emacs20 (20.7-13.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-powerpc/emacs20_20.7-13.3_powerpc.deb
emacs20 (20.7-13.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-mipsel/emacs20_20.7-13.3_mipsel.deb
emacs20 (20.7-13.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-mips/emacs20_20.7-13.3_mips.deb
emacs20 (20.7-13.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-m68k/emacs20_20.7-13.3_m68k.deb
emacs20 (20.7-13.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-i386/emacs20_20.7-13.3_i386.deb
emacs20 (20.7-13.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-hppa/emacs20_20.7-13.3_hppa.deb
emacs20 (20.7-13.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-arm/emacs20_20.7-13.3_arm.deb
emacs20 (20.7-13.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-alpha/emacs20_20.7-13.3_alpha.deb
emacs20 (20.7-13.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/source/emacs20_20.7-13.3.diff.gz
stable/main/binary-all/emacs20-el_20.7-13.3_all.deb
stable/main/binary-ia64/emacs20_20.7-13.3_ia64.deb
stable/main/source/emacs20_20.7-13.3.dsc
emacs20 (20.7-13.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Max Vozeler to fix format string vulnerabilities
    [lib-src/movemail.c, CAN-2005-0100]
  * Non-changes build so that the i386 buildd can pick up the package
    again so that the build might eventually end up in the archive


stable/main/binary-sparc/cupsys-bsd_1.1.14-5woody12_sparc.deb
stable/main/binary-sparc/cupsys-pstoraster_1.1.14-5woody12_sparc.deb
stable/main/binary-sparc/libcupsys2-dev_1.1.14-5woody12_sparc.deb
stable/main/binary-sparc/libcupsys2_1.1.14-5woody12_sparc.deb
stable/main/binary-sparc/cupsys_1.1.14-5woody12_sparc.deb
stable/main/binary-sparc/cupsys-client_1.1.14-5woody12_sparc.deb
cupsys (1.1.14-5woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [pdftops/Decrypt.cxx, CAN-2005-0064]


stable/main/binary-s390/libcupsys2_1.1.14-5woody12_s390.deb
stable/main/binary-s390/cupsys-pstoraster_1.1.14-5woody12_s390.deb
stable/main/binary-s390/cupsys_1.1.14-5woody12_s390.deb
stable/main/binary-s390/libcupsys2-dev_1.1.14-5woody12_s390.deb
stable/main/binary-s390/cupsys-bsd_1.1.14-5woody12_s390.deb
stable/main/binary-s390/cupsys-client_1.1.14-5woody12_s390.deb
cupsys (1.1.14-5woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [pdftops/Decrypt.cxx, CAN-2005-0064]


stable/main/binary-powerpc/libcupsys2-dev_1.1.14-5woody12_powerpc.deb
stable/main/binary-powerpc/cupsys-bsd_1.1.14-5woody12_powerpc.deb
stable/main/binary-powerpc/libcupsys2_1.1.14-5woody12_powerpc.deb
stable/main/binary-powerpc/cupsys-pstoraster_1.1.14-5woody12_powerpc.deb
stable/main/binary-powerpc/cupsys-client_1.1.14-5woody12_powerpc.deb
stable/main/binary-powerpc/cupsys_1.1.14-5woody12_powerpc.deb
cupsys (1.1.14-5woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [pdftops/Decrypt.cxx, CAN-2005-0064]


stable/main/binary-mips/libcupsys2-dev_1.1.14-5woody12_mips.deb
stable/main/binary-mips/libcupsys2_1.1.14-5woody12_mips.deb
stable/main/binary-mips/cupsys-client_1.1.14-5woody12_mips.deb
stable/main/binary-mips/cupsys_1.1.14-5woody12_mips.deb
stable/main/binary-mips/cupsys-bsd_1.1.14-5woody12_mips.deb
stable/main/binary-mips/cupsys-pstoraster_1.1.14-5woody12_mips.deb
cupsys (1.1.14-5woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [pdftops/Decrypt.cxx, CAN-2005-0064]


stable/main/binary-m68k/libcupsys2-dev_1.1.14-5woody12_m68k.deb
stable/main/binary-m68k/cupsys-bsd_1.1.14-5woody12_m68k.deb
stable/main/binary-m68k/libcupsys2_1.1.14-5woody12_m68k.deb
stable/main/binary-m68k/cupsys-client_1.1.14-5woody12_m68k.deb
stable/main/binary-m68k/cupsys_1.1.14-5woody12_m68k.deb
stable/main/binary-m68k/cupsys-pstoraster_1.1.14-5woody12_m68k.deb
cupsys (1.1.14-5woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [pdftops/Decrypt.cxx, CAN-2005-0064]


stable/main/binary-ia64/cupsys-pstoraster_1.1.14-5woody12_ia64.deb
stable/main/binary-ia64/cupsys-client_1.1.14-5woody12_ia64.deb
stable/main/binary-ia64/cupsys-bsd_1.1.14-5woody12_ia64.deb
stable/main/binary-ia64/libcupsys2-dev_1.1.14-5woody12_ia64.deb
stable/main/binary-ia64/cupsys_1.1.14-5woody12_ia64.deb
stable/main/binary-ia64/libcupsys2_1.1.14-5woody12_ia64.deb
cupsys (1.1.14-5woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [pdftops/Decrypt.cxx, CAN-2005-0064]


stable/main/binary-i386/libcupsys2_1.1.14-5woody12_i386.deb
stable/main/binary-i386/libcupsys2-dev_1.1.14-5woody12_i386.deb
stable/main/binary-i386/cupsys_1.1.14-5woody12_i386.deb
stable/main/binary-i386/cupsys-client_1.1.14-5woody12_i386.deb
stable/main/binary-i386/cupsys-pstoraster_1.1.14-5woody12_i386.deb
stable/main/binary-i386/cupsys-bsd_1.1.14-5woody12_i386.deb
cupsys (1.1.14-5woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [pdftops/Decrypt.cxx, CAN-2005-0064]


stable/main/binary-hppa/cupsys-pstoraster_1.1.14-5woody12_hppa.deb
stable/main/binary-hppa/libcupsys2_1.1.14-5woody12_hppa.deb
stable/main/binary-hppa/cupsys-bsd_1.1.14-5woody12_hppa.deb
stable/main/binary-hppa/libcupsys2-dev_1.1.14-5woody12_hppa.deb
stable/main/binary-hppa/cupsys_1.1.14-5woody12_hppa.deb
stable/main/binary-hppa/cupsys-client_1.1.14-5woody12_hppa.deb
cupsys (1.1.14-5woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [pdftops/Decrypt.cxx, CAN-2005-0064]


stable/main/binary-arm/cupsys-client_1.1.14-5woody12_arm.deb
stable/main/binary-arm/cupsys_1.1.14-5woody12_arm.deb
stable/main/binary-arm/libcupsys2_1.1.14-5woody12_arm.deb
stable/main/binary-arm/cupsys-pstoraster_1.1.14-5woody12_arm.deb
stable/main/binary-arm/libcupsys2-dev_1.1.14-5woody12_arm.deb
stable/main/binary-arm/cupsys-bsd_1.1.14-5woody12_arm.deb
cupsys (1.1.14-5woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [pdftops/Decrypt.cxx, CAN-2005-0064]


stable/main/binary-alpha/cupsys_1.1.14-5woody12_alpha.deb
stable/main/binary-alpha/libcupsys2_1.1.14-5woody12_alpha.deb
stable/main/binary-alpha/libcupsys2-dev_1.1.14-5woody12_alpha.deb
stable/main/binary-alpha/cupsys-bsd_1.1.14-5woody12_alpha.deb
stable/main/binary-alpha/cupsys-pstoraster_1.1.14-5woody12_alpha.deb
stable/main/binary-alpha/cupsys-client_1.1.14-5woody12_alpha.deb
cupsys (1.1.14-5woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [pdftops/Decrypt.cxx, CAN-2005-0064]


stable/main/binary-mipsel/cupsys_1.1.14-5woody12_mipsel.deb
stable/main/source/cupsys_1.1.14-5woody12.dsc
stable/main/binary-mipsel/cupsys-client_1.1.14-5woody12_mipsel.deb
stable/main/binary-mipsel/libcupsys2_1.1.14-5woody12_mipsel.deb
stable/main/binary-mipsel/cupsys-pstoraster_1.1.14-5woody12_mipsel.deb
stable/main/binary-mipsel/cupsys-bsd_1.1.14-5woody12_mipsel.deb
stable/main/source/cupsys_1.1.14-5woody12.diff.gz
stable/main/binary-mipsel/libcupsys2-dev_1.1.14-5woody12_mipsel.deb
cupsys (1.1.14-5woody12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow that could overwrite the stack and hence cause
    the execution of arbitrary code as reported by iDEFENSE
    [pdftops/Decrypt.cxx, CAN-2005-0064]


stable/main/binary-sparc/cpio_2.4.2-39woody1_sparc.deb
cpio (2.4.2-39woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Forward ported patch from Albert Chin-A-Young to fix broken
    permissions on output file with -O/-F [main.c, CAN-1999-1572,
    http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec]


stable/main/binary-s390/cpio_2.4.2-39woody1_s390.deb
cpio (2.4.2-39woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Forward ported patch from Albert Chin-A-Young to fix broken
    permissions on output file with -O/-F [main.c, CAN-1999-1572,
    http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec]


stable/main/binary-powerpc/cpio_2.4.2-39woody1_powerpc.deb
cpio (2.4.2-39woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Forward ported patch from Albert Chin-A-Young to fix broken
    permissions on output file with -O/-F [main.c, CAN-1999-1572,
    http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec]


stable/main/binary-mips/cpio_2.4.2-39woody1_mips.deb
cpio (2.4.2-39woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Forward ported patch from Albert Chin-A-Young to fix broken
    permissions on output file with -O/-F [main.c, CAN-1999-1572,
    http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec]


stable/main/binary-m68k/cpio_2.4.2-39woody1_m68k.deb
cpio (2.4.2-39woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Forward ported patch from Albert Chin-A-Young to fix broken
    permissions on output file with -O/-F [main.c, CAN-1999-1572,
    http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec]


stable/main/binary-ia64/cpio_2.4.2-39woody1_ia64.deb
cpio (2.4.2-39woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Forward ported patch from Albert Chin-A-Young to fix broken
    permissions on output file with -O/-F [main.c, CAN-1999-1572,
    http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec]


stable/main/binary-i386/cpio_2.4.2-39woody1_i386.deb
cpio (2.4.2-39woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Forward ported patch from Albert Chin-A-Young to fix broken
    permissions on output file with -O/-F [main.c, CAN-1999-1572,
    http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec]


stable/main/binary-hppa/cpio_2.4.2-39woody1_hppa.deb
cpio (2.4.2-39woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Forward ported patch from Albert Chin-A-Young to fix broken
    permissions on output file with -O/-F [main.c, CAN-1999-1572,
    http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec]


stable/main/binary-arm/cpio_2.4.2-39woody1_arm.deb
cpio (2.4.2-39woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Forward ported patch from Albert Chin-A-Young to fix broken
    permissions on output file with -O/-F [main.c, CAN-1999-1572,
    http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec]


stable/main/binary-alpha/cpio_2.4.2-39woody1_alpha.deb
cpio (2.4.2-39woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Forward ported patch from Albert Chin-A-Young to fix broken
    permissions on output file with -O/-F [main.c, CAN-1999-1572,
    http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec]


stable/main/source/cpio_2.4.2-39woody1.diff.gz
stable/main/source/cpio_2.4.2-39woody1.dsc
stable/main/binary-mipsel/cpio_2.4.2-39woody1_mipsel.deb
cpio (2.4.2-39woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Forward ported patch from Albert Chin-A-Young to fix broken
    permissions on output file with -O/-F [main.c, CAN-1999-1572,
    http://groups-beta.google.com/group/gnu.utils.bug/msg/4db088ee6031c9ec]


stable/main/binary-sparc/chbg_1.5-1woody1_sparc.deb
chbg (1.5-1woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow when reading scenario files.
    [config.c, CAN-2004-1264]


stable/main/binary-s390/chbg_1.5-1woody1_s390.deb
chbg (1.5-1woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow when reading scenario files.
    [config.c, CAN-2004-1264]


stable/main/binary-powerpc/chbg_1.5-1woody1_powerpc.deb
chbg (1.5-1woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow when reading scenario files.
    [config.c, CAN-2004-1264]


stable/main/binary-mipsel/chbg_1.5-1woody1_mipsel.deb
chbg (1.5-1woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow when reading scenario files.
    [config.c, CAN-2004-1264]


stable/main/binary-mips/chbg_1.5-1woody1_mips.deb
chbg (1.5-1woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow when reading scenario files.
    [config.c, CAN-2004-1264]


stable/main/binary-m68k/chbg_1.5-1woody1_m68k.deb
chbg (1.5-1woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow when reading scenario files.
    [config.c, CAN-2004-1264]


stable/main/binary-ia64/chbg_1.5-1woody1_ia64.deb
chbg (1.5-1woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow when reading scenario files.
    [config.c, CAN-2004-1264]


stable/main/binary-arm/chbg_1.5-1woody1_arm.deb
chbg (1.5-1woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow when reading scenario files.
    [config.c, CAN-2004-1264]


stable/main/binary-alpha/chbg_1.5-1woody1_alpha.deb
chbg (1.5-1woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow when reading scenario files.
    [config.c, CAN-2004-1264]


stable/main/binary-i386/chbg_1.5-1woody1_i386.deb
stable/main/source/chbg_1.5-1woody1.diff.gz
stable/main/source/chbg_1.5-1woody1.dsc
chbg (1.5-1woody1) stable-security; urgency=high
  * Non maintainer upload by The Security Team
  * Fix buffer overflow when reading scenario files.
    [config.c, CAN-2004-1264]


stable/main/binary-all/cacti_0.6.7-2.2_all.deb
stable/main/source/cacti_0.6.7-2.2.diff.gz
stable/main/source/cacti_0.6.7-2.2.dsc
cacti (0.6.7-2.2) stable-security; urgency=medium
  * Non-maintainer upload by Stable Release Manager
  * Bumped version number and rebuilt so that the package can make it
    into stable (DSA 164)


stable/main/binary-sparc/bsmtpd_2.3pl8b-12woody1_sparc.deb
bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Bastian Blank to properly sanitise addresses before
    they are used as commandline arguments [bsmtpd.c, CAN-2005-0107]


stable/main/binary-s390/bsmtpd_2.3pl8b-12woody1_s390.deb
bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Bastian Blank to properly sanitise addresses before
    they are used as commandline arguments [bsmtpd.c, CAN-2005-0107]


stable/main/binary-powerpc/bsmtpd_2.3pl8b-12woody1_powerpc.deb
bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Bastian Blank to properly sanitise addresses before
    they are used as commandline arguments [bsmtpd.c, CAN-2005-0107]


stable/main/binary-mips/bsmtpd_2.3pl8b-12woody1_mips.deb
bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Bastian Blank to properly sanitise addresses before
    they are used as commandline arguments [bsmtpd.c, CAN-2005-0107]


stable/main/binary-m68k/bsmtpd_2.3pl8b-12woody1_m68k.deb
bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Bastian Blank to properly sanitise addresses before
    they are used as commandline arguments [bsmtpd.c, CAN-2005-0107]


stable/main/binary-ia64/bsmtpd_2.3pl8b-12woody1_ia64.deb
bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Bastian Blank to properly sanitise addresses before
    they are used as commandline arguments [bsmtpd.c, CAN-2005-0107]


stable/main/binary-i386/bsmtpd_2.3pl8b-12woody1_i386.deb
bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Bastian Blank to properly sanitise addresses before
    they are used as commandline arguments [bsmtpd.c, CAN-2005-0107]


stable/main/binary-hppa/bsmtpd_2.3pl8b-12woody1_hppa.deb
bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Bastian Blank to properly sanitise addresses before
    they are used as commandline arguments [bsmtpd.c, CAN-2005-0107]


stable/main/binary-arm/bsmtpd_2.3pl8b-12woody1_arm.deb
bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Bastian Blank to properly sanitise addresses before
    they are used as commandline arguments [bsmtpd.c, CAN-2005-0107]


stable/main/binary-alpha/bsmtpd_2.3pl8b-12woody1_alpha.deb
bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Bastian Blank to properly sanitise addresses before
    they are used as commandline arguments [bsmtpd.c, CAN-2005-0107]


stable/main/binary-mipsel/bsmtpd_2.3pl8b-12woody1_mipsel.deb
stable/main/source/bsmtpd_2.3pl8b-12woody1.dsc
stable/main/source/bsmtpd_2.3pl8b-12woody1.diff.gz
bsmtpd (2.3pl8b-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Bastian Blank to properly sanitise addresses before
    they are used as commandline arguments [bsmtpd.c, CAN-2005-0107]


stable/main/source/bmv_1.2-14.2.dsc
stable/main/source/bmv_1.2-14.2.diff.gz
stable/main/binary-i386/bmv_1.2-14.2_i386.deb
bmv (1.2-14.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted upstream patch from Peter Samuelson [gsinterf.c]
  * Applied patch from Guillem Jover to fix insecure temporary file use
    [gsinterf.c, CAN-2003-0014]


stable/main/binary-sparc/bidwatcher_1.3.3-1woody1_sparc.deb
bidwatcher (1.3.3-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Ulf Haernhammar to fix format string vulnerability
    [netstuff.cpp, CAN-2005-0158]


stable/main/binary-s390/bidwatcher_1.3.3-1woody1_s390.deb
bidwatcher (1.3.3-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Ulf Haernhammar to fix format string vulnerability
    [netstuff.cpp, CAN-2005-0158]


stable/main/binary-powerpc/bidwatcher_1.3.3-1woody1_powerpc.deb
bidwatcher (1.3.3-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Ulf Haernhammar to fix format string vulnerability
    [netstuff.cpp, CAN-2005-0158]


stable/main/binary-mips/bidwatcher_1.3.3-1woody1_mips.deb
bidwatcher (1.3.3-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Ulf Haernhammar to fix format string vulnerability
    [netstuff.cpp, CAN-2005-0158]


stable/main/binary-m68k/bidwatcher_1.3.3-1woody1_m68k.deb
bidwatcher (1.3.3-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Ulf Haernhammar to fix format string vulnerability
    [netstuff.cpp, CAN-2005-0158]


stable/main/binary-ia64/bidwatcher_1.3.3-1woody1_ia64.deb
bidwatcher (1.3.3-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Ulf Haernhammar to fix format string vulnerability
    [netstuff.cpp, CAN-2005-0158]


stable/main/binary-i386/bidwatcher_1.3.3-1woody1_i386.deb
bidwatcher (1.3.3-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Ulf Haernhammar to fix format string vulnerability
    [netstuff.cpp, CAN-2005-0158]


stable/main/binary-hppa/bidwatcher_1.3.3-1woody1_hppa.deb
bidwatcher (1.3.3-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Ulf Haernhammar to fix format string vulnerability
    [netstuff.cpp, CAN-2005-0158]


stable/main/binary-arm/bidwatcher_1.3.3-1woody1_arm.deb
bidwatcher (1.3.3-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Ulf Haernhammar to fix format string vulnerability
    [netstuff.cpp, CAN-2005-0158]


stable/main/binary-alpha/bidwatcher_1.3.3-1woody1_alpha.deb
bidwatcher (1.3.3-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Ulf Haernhammar to fix format string vulnerability
    [netstuff.cpp, CAN-2005-0158]


stable/main/source/bidwatcher_1.3.3-1woody1.dsc
stable/main/binary-mipsel/bidwatcher_1.3.3-1woody1_mipsel.deb
stable/main/source/bidwatcher_1.3.3-1woody1.diff.gz
bidwatcher (1.3.3-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported patch by Ulf Haernhammar to fix format string vulnerability
    [netstuff.cpp, CAN-2005-0158]


stable/main/binary-sparc/axel_1.0a-1woody1_sparc.deb
axel (1.0a-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer
    overflow [conn.c, CAN-2005-0390]


stable/main/binary-s390/axel_1.0a-1woody1_s390.deb
axel (1.0a-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer
    overflow [conn.c, CAN-2005-0390]


stable/main/binary-powerpc/axel_1.0a-1woody1_powerpc.deb
axel (1.0a-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer
    overflow [conn.c, CAN-2005-0390]


stable/main/binary-mipsel/axel_1.0a-1woody1_mipsel.deb
axel (1.0a-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer
    overflow [conn.c, CAN-2005-0390]


stable/main/binary-mips/axel_1.0a-1woody1_mips.deb
axel (1.0a-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer
    overflow [conn.c, CAN-2005-0390]


stable/main/binary-m68k/axel_1.0a-1woody1_m68k.deb
axel (1.0a-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer
    overflow [conn.c, CAN-2005-0390]


stable/main/binary-ia64/axel_1.0a-1woody1_ia64.deb
axel (1.0a-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer
    overflow [conn.c, CAN-2005-0390]


stable/main/binary-i386/axel_1.0a-1woody1_i386.deb
axel (1.0a-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer
    overflow [conn.c, CAN-2005-0390]


stable/main/binary-hppa/axel_1.0a-1woody1_hppa.deb
axel (1.0a-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer
    overflow [conn.c, CAN-2005-0390]


stable/main/binary-alpha/axel_1.0a-1woody1_alpha.deb
axel (1.0a-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer
    overflow [conn.c, CAN-2005-0390]


stable/main/binary-arm/axel_1.0a-1woody1_arm.deb
stable/main/source/axel_1.0a-1woody1.diff.gz
stable/main/binary-all/axel-kapt_1.0a-1woody1_all.deb
stable/main/source/axel_1.0a-1woody1.dsc
axel (1.0a-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix remotely exploitible buffer
    overflow [conn.c, CAN-2005-0390]


stable/main/source/awstats_4.0-0.woody.2.dsc
stable/main/source/awstats_4.0-0.woody.2.diff.gz
stable/main/binary-all/awstats_4.0-0.woody.2_all.deb
awstats (4.0-0.woody.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Martin Pitt to fix a cross-site scripting
    vulnerability [wwwroot/cgi-bin/awstats.pl, CAN-2005-0363]


stable/main/binary-sparc/abuse_2.00+-3woody4_sparc.deb
abuse (2.00+-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges
    after dropping them in the fix for unsafe file creation
    [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099]


stable/main/binary-s390/abuse_2.00+-3woody4_s390.deb
abuse (2.00+-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges
    after dropping them in the fix for unsafe file creation
    [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099]


stable/main/binary-powerpc/abuse_2.00+-3woody4_powerpc.deb
abuse (2.00+-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges
    after dropping them in the fix for unsafe file creation
    [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099]


stable/main/binary-mipsel/abuse_2.00+-3woody4_mipsel.deb
abuse (2.00+-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges
    after dropping them in the fix for unsafe file creation
    [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099]


stable/main/binary-mips/abuse_2.00+-3woody4_mips.deb
abuse (2.00+-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges
    after dropping them in the fix for unsafe file creation
    [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099]


stable/main/binary-m68k/abuse_2.00+-3woody4_m68k.deb
abuse (2.00+-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges
    after dropping them in the fix for unsafe file creation
    [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099]


stable/main/binary-ia64/abuse_2.00+-3woody4_ia64.deb
abuse (2.00+-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges
    after dropping them in the fix for unsafe file creation
    [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099]


stable/main/binary-hppa/abuse_2.00+-3woody4_hppa.deb
abuse (2.00+-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges
    after dropping them in the fix for unsafe file creation
    [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099]


stable/main/binary-arm/abuse_2.00+-3woody4_arm.deb
abuse (2.00+-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges
    after dropping them in the fix for unsafe file creation
    [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099]


stable/main/binary-alpha/abuse_2.00+-3woody4_alpha.deb
abuse (2.00+-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges
    after dropping them in the fix for unsafe file creation
    [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099]


stable/main/source/abuse_2.00+-3woody4.diff.gz
stable/main/binary-i386/abuse_2.00+-3woody4_i386.deb
stable/main/source/abuse_2.00+-3woody4.dsc
abuse (2.00+-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted debian/patches/13_tmpfiles.diff so it can regain privileges
    after dropping them in the fix for unsafe file creation
    [imlib/specs.c, abuse/src/cache.c, CAN-2005-0099]


stable/main/binary-sparc/php3_3.0.18-23.1woody3_sparc.deb
stable/main/binary-sparc/php3-cgi-ldap_3.0.18-23.1woody3_sparc.deb
stable/main/binary-sparc/php3-cgi-mhash_3.0.18-23.1woody3_sparc.deb
stable/main/binary-sparc/php3-mysql_3.0.18-23.1woody3_sparc.deb
stable/main/binary-sparc/php3-xml_3.0.18-23.1woody3_sparc.deb
stable/main/binary-sparc/php3-cgi_3.0.18-23.1woody3_sparc.deb
stable/main/binary-sparc/php3-mhash_3.0.18-23.1woody3_sparc.deb
stable/main/binary-sparc/php3-cgi-snmp_3.0.18-23.1woody3_sparc.deb
stable/main/binary-sparc/php3-cgi-mysql_3.0.18-23.1woody3_sparc.deb
stable/main/binary-sparc/php3-ldap_3.0.18-23.1woody3_sparc.deb
stable/main/binary-sparc/php3-cgi-xml_3.0.18-23.1woody3_sparc.deb
stable/main/binary-sparc/php3-dev_3.0.18-23.1woody3_sparc.deb
stable/main/binary-sparc/php3-cgi-gd_3.0.18-23.1woody3_sparc.deb
stable/main/binary-sparc/php3-snmp_3.0.18-23.1woody3_sparc.deb
stable/main/binary-sparc/php3-imap_3.0.18-23.1woody3_sparc.deb
stable/main/binary-sparc/php3-magick_3.0.18-23.1woody3_sparc.deb
stable/main/binary-sparc/php3-cgi-magick_3.0.18-23.1woody3_sparc.deb
stable/main/binary-sparc/php3-cgi-imap_3.0.18-23.1woody3_sparc.deb
stable/main/binary-sparc/php3-gd_3.0.18-23.1woody3_sparc.deb
php3 (3:3.0.18-23.1woody3) stable-security; urgency=high
  * Backport fixes to functions/image.c from the 4.3 branch:
    - Avoid infinite loops in the php3_skip_variable() function and the
      php3_read_APP() function which were being called indirectly by
      getimagesize() function.  As this function is commonly called
      with untrusted data, this becomes a remote DoS. [functions/image.c]
    - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable
      to CAN-2005-0524, the sister bug to this one)


stable/main/binary-s390/php3-cgi-imap_3.0.18-23.1woody3_s390.deb
stable/main/binary-s390/php3-cgi-magick_3.0.18-23.1woody3_s390.deb
stable/main/binary-s390/php3-ldap_3.0.18-23.1woody3_s390.deb
stable/main/binary-s390/php3-cgi-snmp_3.0.18-23.1woody3_s390.deb
stable/main/binary-s390/php3-mysql_3.0.18-23.1woody3_s390.deb
stable/main/binary-s390/php3-cgi-gd_3.0.18-23.1woody3_s390.deb
stable/main/binary-s390/php3-cgi_3.0.18-23.1woody3_s390.deb
stable/main/binary-s390/php3-magick_3.0.18-23.1woody3_s390.deb
stable/main/binary-s390/php3-cgi-ldap_3.0.18-23.1woody3_s390.deb
stable/main/binary-s390/php3-snmp_3.0.18-23.1woody3_s390.deb
stable/main/binary-s390/php3-cgi-mysql_3.0.18-23.1woody3_s390.deb
stable/main/binary-s390/php3-cgi-mhash_3.0.18-23.1woody3_s390.deb
stable/main/binary-s390/php3-imap_3.0.18-23.1woody3_s390.deb
stable/main/binary-s390/php3-cgi-xml_3.0.18-23.1woody3_s390.deb
stable/main/binary-s390/php3-gd_3.0.18-23.1woody3_s390.deb
stable/main/binary-s390/php3-dev_3.0.18-23.1woody3_s390.deb
stable/main/binary-s390/php3-mhash_3.0.18-23.1woody3_s390.deb
stable/main/binary-s390/php3_3.0.18-23.1woody3_s390.deb
stable/main/binary-s390/php3-xml_3.0.18-23.1woody3_s390.deb
php3 (3:3.0.18-23.1woody3) stable-security; urgency=high
  * Backport fixes to functions/image.c from the 4.3 branch:
    - Avoid infinite loops in the php3_skip_variable() function and the
      php3_read_APP() function which were being called indirectly by
      getimagesize() function.  As this function is commonly called
      with untrusted data, this becomes a remote DoS. [functions/image.c]
    - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable
      to CAN-2005-0524, the sister bug to this one)


stable/main/binary-powerpc/php3-cgi-snmp_3.0.18-23.1woody3_powerpc.deb
stable/main/binary-powerpc/php3-cgi-gd_3.0.18-23.1woody3_powerpc.deb
stable/main/binary-powerpc/php3-cgi_3.0.18-23.1woody3_powerpc.deb
stable/main/binary-powerpc/php3-mysql_3.0.18-23.1woody3_powerpc.deb
stable/main/binary-powerpc/php3-magick_3.0.18-23.1woody3_powerpc.deb
stable/main/binary-powerpc/php3-cgi-imap_3.0.18-23.1woody3_powerpc.deb
stable/main/binary-powerpc/php3-snmp_3.0.18-23.1woody3_powerpc.deb
stable/main/binary-powerpc/php3-cgi-ldap_3.0.18-23.1woody3_powerpc.deb
stable/main/binary-powerpc/php3-cgi-mysql_3.0.18-23.1woody3_powerpc.deb
stable/main/binary-powerpc/php3-cgi-xml_3.0.18-23.1woody3_powerpc.deb
stable/main/binary-powerpc/php3-ldap_3.0.18-23.1woody3_powerpc.deb
stable/main/binary-powerpc/php3-xml_3.0.18-23.1woody3_powerpc.deb
stable/main/binary-powerpc/php3-dev_3.0.18-23.1woody3_powerpc.deb
stable/main/binary-powerpc/php3-mhash_3.0.18-23.1woody3_powerpc.deb
stable/main/binary-powerpc/php3-imap_3.0.18-23.1woody3_powerpc.deb
stable/main/binary-powerpc/php3-gd_3.0.18-23.1woody3_powerpc.deb
stable/main/binary-powerpc/php3_3.0.18-23.1woody3_powerpc.deb
stable/main/binary-powerpc/php3-cgi-magick_3.0.18-23.1woody3_powerpc.deb
stable/main/binary-powerpc/php3-cgi-mhash_3.0.18-23.1woody3_powerpc.deb
php3 (3:3.0.18-23.1woody3) stable-security; urgency=high
  * Backport fixes to functions/image.c from the 4.3 branch:
    - Avoid infinite loops in the php3_skip_variable() function and the
      php3_read_APP() function which were being called indirectly by
      getimagesize() function.  As this function is commonly called
      with untrusted data, this becomes a remote DoS. [functions/image.c]
    - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable
      to CAN-2005-0524, the sister bug to this one)


stable/main/binary-mipsel/php3-snmp_3.0.18-23.1woody3_mipsel.deb
stable/main/binary-mipsel/php3-cgi-magick_3.0.18-23.1woody3_mipsel.deb
stable/main/binary-mipsel/php3-mysql_3.0.18-23.1woody3_mipsel.deb
stable/main/binary-mipsel/php3-cgi-ldap_3.0.18-23.1woody3_mipsel.deb
stable/main/binary-mipsel/php3-mhash_3.0.18-23.1woody3_mipsel.deb
stable/main/binary-mipsel/php3-dev_3.0.18-23.1woody3_mipsel.deb
stable/main/binary-mipsel/php3-cgi-snmp_3.0.18-23.1woody3_mipsel.deb
stable/main/binary-mipsel/php3-cgi_3.0.18-23.1woody3_mipsel.deb
stable/main/binary-mipsel/php3_3.0.18-23.1woody3_mipsel.deb
stable/main/binary-mipsel/php3-cgi-xml_3.0.18-23.1woody3_mipsel.deb
stable/main/binary-mipsel/php3-cgi-gd_3.0.18-23.1woody3_mipsel.deb
stable/main/binary-mipsel/php3-xml_3.0.18-23.1woody3_mipsel.deb
stable/main/binary-mipsel/php3-cgi-imap_3.0.18-23.1woody3_mipsel.deb
stable/main/binary-mipsel/php3-gd_3.0.18-23.1woody3_mipsel.deb
stable/main/binary-mipsel/php3-cgi-mysql_3.0.18-23.1woody3_mipsel.deb
stable/main/binary-mipsel/php3-magick_3.0.18-23.1woody3_mipsel.deb
stable/main/binary-mipsel/php3-imap_3.0.18-23.1woody3_mipsel.deb
stable/main/binary-mipsel/php3-cgi-mhash_3.0.18-23.1woody3_mipsel.deb
stable/main/binary-mipsel/php3-ldap_3.0.18-23.1woody3_mipsel.deb
php3 (3:3.0.18-23.1woody3) stable-security; urgency=high
  * Backport fixes to functions/image.c from the 4.3 branch:
    - Avoid infinite loops in the php3_skip_variable() function and the
      php3_read_APP() function which were being called indirectly by
      getimagesize() function.  As this function is commonly called
      with untrusted data, this becomes a remote DoS. [functions/image.c]
    - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable
      to CAN-2005-0524, the sister bug to this one)


stable/main/binary-mips/php3-imap_3.0.18-23.1woody3_mips.deb
stable/main/binary-mips/php3-magick_3.0.18-23.1woody3_mips.deb
stable/main/binary-mips/php3-cgi-gd_3.0.18-23.1woody3_mips.deb
stable/main/binary-mips/php3-dev_3.0.18-23.1woody3_mips.deb
stable/main/binary-mips/php3-cgi-mysql_3.0.18-23.1woody3_mips.deb
stable/main/binary-mips/php3-cgi-magick_3.0.18-23.1woody3_mips.deb
stable/main/binary-mips/php3-gd_3.0.18-23.1woody3_mips.deb
stable/main/binary-mips/php3-cgi-snmp_3.0.18-23.1woody3_mips.deb
stable/main/binary-mips/php3-cgi-ldap_3.0.18-23.1woody3_mips.deb
stable/main/binary-mips/php3-ldap_3.0.18-23.1woody3_mips.deb
stable/main/binary-mips/php3-xml_3.0.18-23.1woody3_mips.deb
stable/main/binary-mips/php3-cgi-xml_3.0.18-23.1woody3_mips.deb
stable/main/binary-mips/php3-mysql_3.0.18-23.1woody3_mips.deb
stable/main/binary-mips/php3_3.0.18-23.1woody3_mips.deb
stable/main/binary-mips/php3-cgi-imap_3.0.18-23.1woody3_mips.deb
stable/main/binary-mips/php3-cgi_3.0.18-23.1woody3_mips.deb
stable/main/binary-mips/php3-cgi-mhash_3.0.18-23.1woody3_mips.deb
stable/main/binary-mips/php3-mhash_3.0.18-23.1woody3_mips.deb
stable/main/binary-mips/php3-snmp_3.0.18-23.1woody3_mips.deb
php3 (3:3.0.18-23.1woody3) stable-security; urgency=high
  * Backport fixes to functions/image.c from the 4.3 branch:
    - Avoid infinite loops in the php3_skip_variable() function and the
      php3_read_APP() function which were being called indirectly by
      getimagesize() function.  As this function is commonly called
      with untrusted data, this becomes a remote DoS. [functions/image.c]
    - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable
      to CAN-2005-0524, the sister bug to this one)


stable/main/binary-m68k/php3-dev_3.0.18-23.1woody3_m68k.deb
stable/main/binary-m68k/php3-ldap_3.0.18-23.1woody3_m68k.deb
stable/main/binary-m68k/php3-mhash_3.0.18-23.1woody3_m68k.deb
stable/main/binary-m68k/php3-cgi-mysql_3.0.18-23.1woody3_m68k.deb
stable/main/binary-m68k/php3-cgi-xml_3.0.18-23.1woody3_m68k.deb
stable/main/binary-m68k/php3-cgi-snmp_3.0.18-23.1woody3_m68k.deb
stable/main/binary-m68k/php3-cgi-gd_3.0.18-23.1woody3_m68k.deb
stable/main/binary-m68k/php3-cgi-magick_3.0.18-23.1woody3_m68k.deb
stable/main/binary-m68k/php3-cgi_3.0.18-23.1woody3_m68k.deb
stable/main/binary-m68k/php3-mysql_3.0.18-23.1woody3_m68k.deb
stable/main/binary-m68k/php3-cgi-ldap_3.0.18-23.1woody3_m68k.deb
stable/main/binary-m68k/php3-xml_3.0.18-23.1woody3_m68k.deb
stable/main/binary-m68k/php3-cgi-mhash_3.0.18-23.1woody3_m68k.deb
stable/main/binary-m68k/php3_3.0.18-23.1woody3_m68k.deb
stable/main/binary-m68k/php3-imap_3.0.18-23.1woody3_m68k.deb
stable/main/binary-m68k/php3-snmp_3.0.18-23.1woody3_m68k.deb
stable/main/binary-m68k/php3-gd_3.0.18-23.1woody3_m68k.deb
stable/main/binary-m68k/php3-magick_3.0.18-23.1woody3_m68k.deb
stable/main/binary-m68k/php3-cgi-imap_3.0.18-23.1woody3_m68k.deb
php3 (3:3.0.18-23.1woody3) stable-security; urgency=high
  * Backport fixes to functions/image.c from the 4.3 branch:
    - Avoid infinite loops in the php3_skip_variable() function and the
      php3_read_APP() function which were being called indirectly by
      getimagesize() function.  As this function is commonly called
      with untrusted data, this becomes a remote DoS. [functions/image.c]
    - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable
      to CAN-2005-0524, the sister bug to this one)


stable/main/binary-ia64/php3-mhash_3.0.18-23.1woody3_ia64.deb
stable/main/binary-ia64/php3-gd_3.0.18-23.1woody3_ia64.deb
stable/main/binary-ia64/php3-imap_3.0.18-23.1woody3_ia64.deb
stable/main/binary-ia64/php3-dev_3.0.18-23.1woody3_ia64.deb
stable/main/binary-ia64/php3-cgi-ldap_3.0.18-23.1woody3_ia64.deb
stable/main/binary-ia64/php3-cgi-magick_3.0.18-23.1woody3_ia64.deb
stable/main/binary-ia64/php3-cgi-mysql_3.0.18-23.1woody3_ia64.deb
stable/main/binary-ia64/php3-cgi-snmp_3.0.18-23.1woody3_ia64.deb
stable/main/binary-ia64/php3-cgi-xml_3.0.18-23.1woody3_ia64.deb
stable/main/binary-ia64/php3-cgi_3.0.18-23.1woody3_ia64.deb
stable/main/binary-ia64/php3-mysql_3.0.18-23.1woody3_ia64.deb
stable/main/binary-ia64/php3-ldap_3.0.18-23.1woody3_ia64.deb
stable/main/binary-ia64/php3-cgi-mhash_3.0.18-23.1woody3_ia64.deb
stable/main/binary-ia64/php3-snmp_3.0.18-23.1woody3_ia64.deb
stable/main/binary-ia64/php3_3.0.18-23.1woody3_ia64.deb
stable/main/binary-ia64/php3-xml_3.0.18-23.1woody3_ia64.deb
stable/main/binary-ia64/php3-cgi-imap_3.0.18-23.1woody3_ia64.deb
stable/main/binary-ia64/php3-magick_3.0.18-23.1woody3_ia64.deb
stable/main/binary-ia64/php3-cgi-gd_3.0.18-23.1woody3_ia64.deb
php3 (3:3.0.18-23.1woody3) stable-security; urgency=high
  * Backport fixes to functions/image.c from the 4.3 branch:
    - Avoid infinite loops in the php3_skip_variable() function and the
      php3_read_APP() function which were being called indirectly by
      getimagesize() function.  As this function is commonly called
      with untrusted data, this becomes a remote DoS. [functions/image.c]
    - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable
      to CAN-2005-0524, the sister bug to this one)


stable/main/binary-i386/php3-cgi-snmp_3.0.18-23.1woody3_i386.deb
stable/main/binary-i386/php3-gd_3.0.18-23.1woody3_i386.deb
stable/main/binary-i386/php3-cgi-magick_3.0.18-23.1woody3_i386.deb
stable/main/binary-i386/php3-cgi-mhash_3.0.18-23.1woody3_i386.deb
stable/main/binary-i386/php3_3.0.18-23.1woody3_i386.deb
stable/main/binary-i386/php3-cgi-imap_3.0.18-23.1woody3_i386.deb
stable/main/binary-i386/php3-cgi-ldap_3.0.18-23.1woody3_i386.deb
stable/main/binary-i386/php3-xml_3.0.18-23.1woody3_i386.deb
stable/main/binary-i386/php3-imap_3.0.18-23.1woody3_i386.deb
stable/main/binary-i386/php3-snmp_3.0.18-23.1woody3_i386.deb
stable/main/binary-i386/php3-cgi-gd_3.0.18-23.1woody3_i386.deb
stable/main/binary-i386/php3-magick_3.0.18-23.1woody3_i386.deb
stable/main/binary-i386/php3-cgi-mysql_3.0.18-23.1woody3_i386.deb
stable/main/binary-i386/php3-cgi_3.0.18-23.1woody3_i386.deb
stable/main/binary-i386/php3-cgi-xml_3.0.18-23.1woody3_i386.deb
stable/main/binary-i386/php3-ldap_3.0.18-23.1woody3_i386.deb
stable/main/binary-i386/php3-mhash_3.0.18-23.1woody3_i386.deb
stable/main/binary-i386/php3-mysql_3.0.18-23.1woody3_i386.deb
stable/main/binary-i386/php3-dev_3.0.18-23.1woody3_i386.deb
php3 (3:3.0.18-23.1woody3) stable-security; urgency=high
  * Backport fixes to functions/image.c from the 4.3 branch:
    - Avoid infinite loops in the php3_skip_variable() function and the
      php3_read_APP() function which were being called indirectly by
      getimagesize() function.  As this function is commonly called
      with untrusted data, this becomes a remote DoS. [functions/image.c]
    - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable
      to CAN-2005-0524, the sister bug to this one)


stable/main/binary-hppa/php3-cgi-mysql_3.0.18-23.1woody3_hppa.deb
stable/main/binary-hppa/php3-ldap_3.0.18-23.1woody3_hppa.deb
stable/main/binary-hppa/php3-dev_3.0.18-23.1woody3_hppa.deb
stable/main/binary-hppa/php3_3.0.18-23.1woody3_hppa.deb
stable/main/binary-hppa/php3-cgi-snmp_3.0.18-23.1woody3_hppa.deb
stable/main/binary-hppa/php3-cgi_3.0.18-23.1woody3_hppa.deb
stable/main/binary-hppa/php3-cgi-gd_3.0.18-23.1woody3_hppa.deb
stable/main/binary-hppa/php3-mysql_3.0.18-23.1woody3_hppa.deb
stable/main/binary-hppa/php3-snmp_3.0.18-23.1woody3_hppa.deb
stable/main/binary-hppa/php3-magick_3.0.18-23.1woody3_hppa.deb
stable/main/binary-hppa/php3-cgi-magick_3.0.18-23.1woody3_hppa.deb
stable/main/binary-hppa/php3-mhash_3.0.18-23.1woody3_hppa.deb
stable/main/binary-hppa/php3-cgi-imap_3.0.18-23.1woody3_hppa.deb
stable/main/binary-hppa/php3-cgi-xml_3.0.18-23.1woody3_hppa.deb
stable/main/binary-hppa/php3-cgi-ldap_3.0.18-23.1woody3_hppa.deb
stable/main/binary-hppa/php3-cgi-mhash_3.0.18-23.1woody3_hppa.deb
stable/main/binary-hppa/php3-xml_3.0.18-23.1woody3_hppa.deb
stable/main/binary-hppa/php3-gd_3.0.18-23.1woody3_hppa.deb
stable/main/binary-hppa/php3-imap_3.0.18-23.1woody3_hppa.deb
php3 (3:3.0.18-23.1woody3) stable-security; urgency=high
  * Backport fixes to functions/image.c from the 4.3 branch:
    - Avoid infinite loops in the php3_skip_variable() function and the
      php3_read_APP() function which were being called indirectly by
      getimagesize() function.  As this function is commonly called
      with untrusted data, this becomes a remote DoS. [functions/image.c]
    - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable
      to CAN-2005-0524, the sister bug to this one)


stable/main/binary-alpha/php3_3.0.18-23.1woody3_alpha.deb
stable/main/binary-alpha/php3-cgi-xml_3.0.18-23.1woody3_alpha.deb
stable/main/binary-alpha/php3-cgi-gd_3.0.18-23.1woody3_alpha.deb
stable/main/binary-alpha/php3-cgi-magick_3.0.18-23.1woody3_alpha.deb
stable/main/binary-alpha/php3-cgi-imap_3.0.18-23.1woody3_alpha.deb
stable/main/binary-alpha/php3-cgi-snmp_3.0.18-23.1woody3_alpha.deb
stable/main/binary-alpha/php3-ldap_3.0.18-23.1woody3_alpha.deb
stable/main/binary-alpha/php3-xml_3.0.18-23.1woody3_alpha.deb
stable/main/binary-alpha/php3-cgi-mhash_3.0.18-23.1woody3_alpha.deb
stable/main/binary-alpha/php3-cgi-mysql_3.0.18-23.1woody3_alpha.deb
stable/main/binary-alpha/php3-cgi-ldap_3.0.18-23.1woody3_alpha.deb
stable/main/binary-alpha/php3-imap_3.0.18-23.1woody3_alpha.deb
stable/main/binary-alpha/php3-gd_3.0.18-23.1woody3_alpha.deb
stable/main/binary-alpha/php3-magick_3.0.18-23.1woody3_alpha.deb
stable/main/binary-alpha/php3-snmp_3.0.18-23.1woody3_alpha.deb
stable/main/binary-alpha/php3-mysql_3.0.18-23.1woody3_alpha.deb
stable/main/binary-alpha/php3-cgi_3.0.18-23.1woody3_alpha.deb
stable/main/binary-alpha/php3-mhash_3.0.18-23.1woody3_alpha.deb
stable/main/binary-alpha/php3-dev_3.0.18-23.1woody3_alpha.deb
php3 (3:3.0.18-23.1woody3) stable-security; urgency=high
  * Backport fixes to functions/image.c from the 4.3 branch:
    - Avoid infinite loops in the php3_skip_variable() function and the
      php3_read_APP() function which were being called indirectly by
      getimagesize() function.  As this function is commonly called
      with untrusted data, this becomes a remote DoS. [functions/image.c]
    - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable
      to CAN-2005-0524, the sister bug to this one)


stable/main/binary-arm/php3-cgi-mhash_3.0.18-23.1woody3_arm.deb
stable/main/binary-arm/php3-cgi-ldap_3.0.18-23.1woody3_arm.deb
stable/main/binary-arm/php3-mhash_3.0.18-23.1woody3_arm.deb
stable/main/binary-arm/php3-magick_3.0.18-23.1woody3_arm.deb
stable/main/binary-arm/php3-snmp_3.0.18-23.1woody3_arm.deb
stable/main/binary-arm/php3-cgi-magick_3.0.18-23.1woody3_arm.deb
stable/main/source/php3_3.0.18-23.1woody3.diff.gz
stable/main/binary-arm/php3-cgi-gd_3.0.18-23.1woody3_arm.deb
stable/main/binary-arm/php3-cgi_3.0.18-23.1woody3_arm.deb
stable/main/binary-arm/php3-imap_3.0.18-23.1woody3_arm.deb
stable/main/binary-arm/php3_3.0.18-23.1woody3_arm.deb
stable/main/binary-arm/php3-cgi-mysql_3.0.18-23.1woody3_arm.deb
stable/main/binary-arm/php3-gd_3.0.18-23.1woody3_arm.deb
stable/main/binary-arm/php3-ldap_3.0.18-23.1woody3_arm.deb
stable/main/binary-arm/php3-dev_3.0.18-23.1woody3_arm.deb
stable/main/binary-arm/php3-xml_3.0.18-23.1woody3_arm.deb
stable/main/binary-arm/php3-cgi-imap_3.0.18-23.1woody3_arm.deb
stable/main/binary-arm/php3-cgi-snmp_3.0.18-23.1woody3_arm.deb
stable/main/source/php3_3.0.18-23.1woody3.dsc
stable/main/binary-arm/php3-mysql_3.0.18-23.1woody3_arm.deb
stable/main/binary-arm/php3-cgi-xml_3.0.18-23.1woody3_arm.deb
stable/main/binary-all/php3-doc_3.0.18-23.1woody3_all.deb
php3 (3:3.0.18-23.1woody3) stable-security; urgency=high
  * Backport fixes to functions/image.c from the 4.3 branch:
    - Avoid infinite loops in the php3_skip_variable() function and the
      php3_read_APP() function which were being called indirectly by
      getimagesize() function.  As this function is commonly called
      with untrusted data, this becomes a remote DoS. [functions/image.c]
    - Addresses CAN-2005-0525 (for refrence, PHP 3.0.18 is not vulnerable
      to CAN-2005-0524, the sister bug to this one)


========================================= 
Fri,  31 Dec 2004 - Debian 3.0r4 released
=========================================
	
stable/main/source/zgv_5.5-3woody2.dsc
stable/main/binary-i386/zgv_5.5-3woody2_i386.deb
stable/main/source/zgv_5.5-3woody2.diff.gz
zgv (5.5-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team to fix the CVE reference


stable/main/binary-sparc/yardradius_1.0.20-2woody1_sparc.deb
yardradius (1.0.20-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix
    arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384]


stable/main/binary-s390/yardradius_1.0.20-2woody1_s390.deb
yardradius (1.0.20-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix
    arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384]


stable/main/binary-powerpc/yardradius_1.0.20-2woody1_powerpc.deb
yardradius (1.0.20-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix
    arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384]


stable/main/binary-mips/yardradius_1.0.20-2woody1_mips.deb
yardradius (1.0.20-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix
    arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384]


stable/main/binary-m68k/yardradius_1.0.20-2woody1_m68k.deb
yardradius (1.0.20-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix
    arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384]


stable/main/binary-ia64/yardradius_1.0.20-2woody1_ia64.deb
yardradius (1.0.20-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix
    arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384]


stable/main/binary-i386/yardradius_1.0.20-2woody1_i386.deb
yardradius (1.0.20-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix
    arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384]


stable/main/binary-hppa/yardradius_1.0.20-2woody1_hppa.deb
yardradius (1.0.20-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix
    arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384]


stable/main/binary-arm/yardradius_1.0.20-2woody1_arm.deb
yardradius (1.0.20-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix
    arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384]


stable/main/binary-alpha/yardradius_1.0.20-2woody1_alpha.deb
yardradius (1.0.20-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix
    arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384]


stable/main/source/yardradius_1.0.20-2woody1.diff.gz
stable/main/binary-mipsel/yardradius_1.0.20-2woody1_mipsel.deb
stable/main/source/yardradius_1.0.20-2woody1.dsc
yardradius (1.0.20-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Max Vozeler and Francesco Paolo Lovergine to fix
    arbitrary code execution [src/menu.c, CAN-2004-0987, Bug#278384]


stable/main/binary-sparc/xzgv_0.7-6woody2_sparc.deb
xzgv (0.7-6woody2) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Added another integer overflow protection, discovered by Ludwig Nussel
    [src/readpng.c, CAN-2004-0994]


stable/main/binary-s390/xzgv_0.7-6woody2_s390.deb
xzgv (0.7-6woody2) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Added another integer overflow protection, discovered by Ludwig Nussel
    [src/readpng.c, CAN-2004-0994]


stable/main/binary-powerpc/xzgv_0.7-6woody2_powerpc.deb
xzgv (0.7-6woody2) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Added another integer overflow protection, discovered by Ludwig Nussel
    [src/readpng.c, CAN-2004-0994]


stable/main/binary-mips/xzgv_0.7-6woody2_mips.deb
xzgv (0.7-6woody2) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Added another integer overflow protection, discovered by Ludwig Nussel
    [src/readpng.c, CAN-2004-0994]


stable/main/binary-m68k/xzgv_0.7-6woody2_m68k.deb
xzgv (0.7-6woody2) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Added another integer overflow protection, discovered by Ludwig Nussel
    [src/readpng.c, CAN-2004-0994]


stable/main/binary-ia64/xzgv_0.7-6woody2_ia64.deb
xzgv (0.7-6woody2) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Added another integer overflow protection, discovered by Ludwig Nussel
    [src/readpng.c, CAN-2004-0994]


stable/main/binary-i386/xzgv_0.7-6woody2_i386.deb
xzgv (0.7-6woody2) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Added another integer overflow protection, discovered by Ludwig Nussel
    [src/readpng.c, CAN-2004-0994]


stable/main/binary-hppa/xzgv_0.7-6woody2_hppa.deb
xzgv (0.7-6woody2) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Added another integer overflow protection, discovered by Ludwig Nussel
    [src/readpng.c, CAN-2004-0994]


stable/main/binary-arm/xzgv_0.7-6woody2_arm.deb
xzgv (0.7-6woody2) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Added another integer overflow protection, discovered by Ludwig Nussel
    [src/readpng.c, CAN-2004-0994]


stable/main/binary-alpha/xzgv_0.7-6woody2_alpha.deb
xzgv (0.7-6woody2) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Added another integer overflow protection, discovered by Ludwig Nussel
    [src/readpng.c, CAN-2004-0994]


stable/main/binary-mipsel/xzgv_0.7-6woody2_mipsel.deb
stable/main/source/xzgv_0.7-6woody2.dsc
stable/main/source/xzgv_0.7-6woody2.diff.gz
xzgv (0.7-6woody2) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Added another integer overflow protection, discovered by Ludwig Nussel
    [src/readpng.c, CAN-2004-0994]


stable/main/binary-sparc/xpdf-reader_1.00-3.2_sparc.deb
stable/main/binary-sparc/xpdf-utils_1.00-3.2_sparc.deb
xpdf (1.00-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied modified patch by Sebastian Krahmer to fix several integer
    overflows discovered by Chris Evans (thanks to Frank Kuester)
    [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888]


stable/main/binary-s390/xpdf-utils_1.00-3.2_s390.deb
stable/main/binary-s390/xpdf-reader_1.00-3.2_s390.deb
xpdf (1.00-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied modified patch by Sebastian Krahmer to fix several integer
    overflows discovered by Chris Evans (thanks to Frank Kuester)
    [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888]


stable/main/binary-powerpc/xpdf-reader_1.00-3.2_powerpc.deb
stable/main/binary-powerpc/xpdf-utils_1.00-3.2_powerpc.deb
xpdf (1.00-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied modified patch by Sebastian Krahmer to fix several integer
    overflows discovered by Chris Evans (thanks to Frank Kuester)
    [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888]


stable/main/binary-mips/xpdf-utils_1.00-3.2_mips.deb
stable/main/binary-mips/xpdf-reader_1.00-3.2_mips.deb
xpdf (1.00-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied modified patch by Sebastian Krahmer to fix several integer
    overflows discovered by Chris Evans (thanks to Frank Kuester)
    [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888]


stable/main/binary-m68k/xpdf-reader_1.00-3.2_m68k.deb
stable/main/binary-m68k/xpdf-utils_1.00-3.2_m68k.deb
xpdf (1.00-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied modified patch by Sebastian Krahmer to fix several integer
    overflows discovered by Chris Evans (thanks to Frank Kuester)
    [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888]


stable/main/binary-ia64/xpdf-reader_1.00-3.2_ia64.deb
stable/main/binary-ia64/xpdf-utils_1.00-3.2_ia64.deb
xpdf (1.00-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied modified patch by Sebastian Krahmer to fix several integer
    overflows discovered by Chris Evans (thanks to Frank Kuester)
    [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888]


stable/main/binary-i386/xpdf-reader_1.00-3.2_i386.deb
stable/main/binary-i386/xpdf-utils_1.00-3.2_i386.deb
xpdf (1.00-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied modified patch by Sebastian Krahmer to fix several integer
    overflows discovered by Chris Evans (thanks to Frank Kuester)
    [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888]


stable/main/binary-hppa/xpdf-utils_1.00-3.2_hppa.deb
stable/main/binary-hppa/xpdf-reader_1.00-3.2_hppa.deb
xpdf (1.00-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied modified patch by Sebastian Krahmer to fix several integer
    overflows discovered by Chris Evans (thanks to Frank Kuester)
    [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888]


stable/main/binary-arm/xpdf-utils_1.00-3.2_arm.deb
stable/main/binary-arm/xpdf-reader_1.00-3.2_arm.deb
xpdf (1.00-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied modified patch by Sebastian Krahmer to fix several integer
    overflows discovered by Chris Evans (thanks to Frank Kuester)
    [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888]


stable/main/binary-alpha/xpdf-utils_1.00-3.2_alpha.deb
stable/main/binary-alpha/xpdf-reader_1.00-3.2_alpha.deb
xpdf (1.00-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied modified patch by Sebastian Krahmer to fix several integer
    overflows discovered by Chris Evans (thanks to Frank Kuester)
    [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888]


stable/main/binary-all/xpdf-common_1.00-3.2_all.deb
stable/main/binary-all/xpdf_1.00-3.2_all.deb
stable/main/source/xpdf_1.00-3.2.dsc
stable/main/source/xpdf_1.00-3.2.diff.gz
stable/main/binary-mipsel/xpdf-utils_1.00-3.2_mipsel.deb
stable/main/binary-mipsel/xpdf-reader_1.00-3.2_mipsel.deb
xpdf (1.00-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied modified patch by Sebastian Krahmer to fix several integer
    overflows discovered by Chris Evans (thanks to Frank Kuester)
    [xpdf/Catalog.cc, xpdf/XRef.cc, CAN-2004-0888]


stable/main/binary-sparc/libxaw6-dbg_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/libxaw7_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/libxaw6_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xlibmesa3-dbg_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/libxaw7-dev_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xlibs_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xserver-xfree86_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/twm_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xprt_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/proxymngr_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xlibs-pic_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xlibosmesa3_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xdm_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/libdps1-dbg_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xserver-common_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/libxaw6-dev_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xlibmesa-dev_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xlibmesa3_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xterm_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/lbxproxy_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xlibosmesa-dev_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/x-window-system-core_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xfs_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xnest_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xutils_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/libxaw7-dbg_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xlibosmesa3-dbg_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xbase-clients_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/libdps-dev_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xlibs-dbg_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/libdps1_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xlibs-dev_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xvfb_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xmh_4.1.0-16woody5_sparc.deb
stable/main/binary-sparc/xfwp_4.1.0-16woody5_sparc.deb
xfree86 (4.1.0-16woody5) stable-security; urgency=low
  * Security update release.  Resolves the following issue:
    + CAN-2004-0914: memory leak, improper use of signed integers, and
      overflow corrections in the Xpm library
  * Resync offset in patch #400.


stable/main/binary-s390/lbxproxy_4.1.0-16woody5_s390.deb
stable/main/binary-s390/xutils_4.1.0-16woody5_s390.deb
stable/main/binary-s390/xlibs-pic_4.1.0-16woody5_s390.deb
stable/main/binary-s390/xlibs_4.1.0-16woody5_s390.deb
stable/main/binary-s390/libxaw7-dev_4.1.0-16woody5_s390.deb
stable/main/binary-s390/xterm_4.1.0-16woody5_s390.deb
stable/main/binary-s390/libxaw6-dbg_4.1.0-16woody5_s390.deb
stable/main/binary-s390/libdps1_4.1.0-16woody5_s390.deb
stable/main/binary-s390/xlibmesa-dev_4.1.0-16woody5_s390.deb
stable/main/binary-s390/xvfb_4.1.0-16woody5_s390.deb
stable/main/binary-s390/libxaw7-dbg_4.1.0-16woody5_s390.deb
stable/main/binary-s390/libxaw6-dev_4.1.0-16woody5_s390.deb
stable/main/binary-s390/libdps1-dbg_4.1.0-16woody5_s390.deb
stable/main/binary-s390/xprt_4.1.0-16woody5_s390.deb
stable/main/binary-s390/libxaw7_4.1.0-16woody5_s390.deb
stable/main/binary-s390/libdps-dev_4.1.0-16woody5_s390.deb
stable/main/binary-s390/twm_4.1.0-16woody5_s390.deb
stable/main/binary-s390/xbase-clients_4.1.0-16woody5_s390.deb
stable/main/binary-s390/xlibmesa3-dbg_4.1.0-16woody5_s390.deb
stable/main/binary-s390/xlibs-dev_4.1.0-16woody5_s390.deb
stable/main/binary-s390/proxymngr_4.1.0-16woody5_s390.deb
stable/main/binary-s390/xdm_4.1.0-16woody5_s390.deb
stable/main/binary-s390/xlibs-dbg_4.1.0-16woody5_s390.deb
stable/main/binary-s390/xserver-common_4.1.0-16woody5_s390.deb
stable/main/binary-s390/xmh_4.1.0-16woody5_s390.deb
stable/main/binary-s390/x-window-system-core_4.1.0-16woody5_s390.deb
stable/main/binary-s390/libxaw6_4.1.0-16woody5_s390.deb
stable/main/binary-s390/xfwp_4.1.0-16woody5_s390.deb
stable/main/binary-s390/xlibmesa3_4.1.0-16woody5_s390.deb
stable/main/binary-s390/xfs_4.1.0-16woody5_s390.deb
stable/main/binary-s390/xnest_4.1.0-16woody5_s390.deb
xfree86 (4.1.0-16woody5) stable-security; urgency=low
  * Security update release.  Resolves the following issue:
    + CAN-2004-0914: memory leak, improper use of signed integers, and
      overflow corrections in the Xpm library
  * Resync offset in patch #400.


stable/main/binary-mipsel/libxaw6-dev_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/xlibmesa3-dbg_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/lbxproxy_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/libxaw7-dev_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/xlibmesa-dev_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/xutils_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/xmh_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/twm_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/xbase-clients_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/xterm_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/xlibs-dev_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/xnest_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/libdps-dev_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/xdm_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/xlibmesa3_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/xlibs-dbg_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/xprt_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/libxaw7-dbg_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/xserver-xfree86_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/libdps1-dbg_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/xfs_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/xlibs_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/xfwp_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/libxaw6_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/xvfb_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/libxaw6-dbg_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/xserver-common_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/libxaw7_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/xlibs-pic_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/proxymngr_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/libdps1_4.1.0-16woody5_mipsel.deb
stable/main/binary-mipsel/x-window-system-core_4.1.0-16woody5_mipsel.deb
xfree86 (4.1.0-16woody5) stable-security; urgency=low
  * Security update release.  Resolves the following issue:
    + CAN-2004-0914: memory leak, improper use of signed integers, and
      overflow corrections in the Xpm library
  * Resync offset in patch #400.


stable/main/binary-mips/libxaw7_4.1.0-16woody5_mips.deb
stable/main/binary-mips/xfs_4.1.0-16woody5_mips.deb
stable/main/binary-mips/libxaw7-dev_4.1.0-16woody5_mips.deb
stable/main/binary-mips/xlibs-pic_4.1.0-16woody5_mips.deb
stable/main/binary-mips/twm_4.1.0-16woody5_mips.deb
stable/main/binary-mips/libdps1_4.1.0-16woody5_mips.deb
stable/main/binary-mips/xnest_4.1.0-16woody5_mips.deb
stable/main/binary-mips/xlibmesa-dev_4.1.0-16woody5_mips.deb
stable/main/binary-mips/libxaw6_4.1.0-16woody5_mips.deb
stable/main/binary-mips/xfwp_4.1.0-16woody5_mips.deb
stable/main/binary-mips/xvfb_4.1.0-16woody5_mips.deb
stable/main/binary-mips/xlibs-dev_4.1.0-16woody5_mips.deb
stable/main/binary-mips/xlibmesa3_4.1.0-16woody5_mips.deb
stable/main/binary-mips/libxaw6-dev_4.1.0-16woody5_mips.deb
stable/main/binary-mips/xlibs_4.1.0-16woody5_mips.deb
stable/main/binary-mips/libdps-dev_4.1.0-16woody5_mips.deb
stable/main/binary-mips/xlibs-dbg_4.1.0-16woody5_mips.deb
stable/main/binary-mips/proxymngr_4.1.0-16woody5_mips.deb
stable/main/binary-mips/libxaw7-dbg_4.1.0-16woody5_mips.deb
stable/main/binary-mips/xutils_4.1.0-16woody5_mips.deb
stable/main/binary-mips/libdps1-dbg_4.1.0-16woody5_mips.deb
stable/main/binary-mips/xbase-clients_4.1.0-16woody5_mips.deb
stable/main/binary-mips/xdm_4.1.0-16woody5_mips.deb
stable/main/binary-mips/xserver-xfree86_4.1.0-16woody5_mips.deb
stable/main/binary-mips/xserver-common_4.1.0-16woody5_mips.deb
stable/main/binary-mips/xprt_4.1.0-16woody5_mips.deb
stable/main/binary-mips/lbxproxy_4.1.0-16woody5_mips.deb
stable/main/binary-mips/libxaw6-dbg_4.1.0-16woody5_mips.deb
stable/main/binary-mips/xterm_4.1.0-16woody5_mips.deb
stable/main/binary-mips/xmh_4.1.0-16woody5_mips.deb
stable/main/binary-mips/x-window-system-core_4.1.0-16woody5_mips.deb
stable/main/binary-mips/xlibmesa3-dbg_4.1.0-16woody5_mips.deb
xfree86 (4.1.0-16woody5) stable-security; urgency=low
  * Security update release.  Resolves the following issue:
    + CAN-2004-0914: memory leak, improper use of signed integers, and
      overflow corrections in the Xpm library
  * Resync offset in patch #400.


stable/main/binary-m68k/xdm_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/xbase-clients_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/libxaw6-dev_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/xlibs-dev_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/libxaw7_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/xfs_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/xlibs-dbg_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/libdps-dev_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/xlibmesa3-dbg_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/xprt_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/libxaw7-dev_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/xfwp_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/proxymngr_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/xnest_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/xlibmesa3_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/libdps1-dbg_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/xvfb_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/xlibs-pic_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/xlibmesa-dev_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/libxaw6-dbg_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/xserver-xfree86_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/xutils_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/libdps1_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/xlibs_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/x-window-system-core_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/xserver-common_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/libxaw7-dbg_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/xterm_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/xmh_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/libxaw6_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/lbxproxy_4.1.0-16woody5_m68k.deb
stable/main/binary-m68k/twm_4.1.0-16woody5_m68k.deb
xfree86 (4.1.0-16woody5) stable-security; urgency=low
  * Security update release.  Resolves the following issue:
    + CAN-2004-0914: memory leak, improper use of signed integers, and
      overflow corrections in the Xpm library
  * Resync offset in patch #400.


stable/main/binary-ia64/xlibs-pic_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xlibs_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/libdps1_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/libxaw7-dbg_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xmh_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/libxaw6_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xfwp_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xbase-clients_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xvfb_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xprt_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/libxaw7_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/lbxproxy_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/libdps-dev_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xlibs-dbg_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xserver-common_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xutils_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xdm_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xlibs-dev_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/x-window-system-core_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xlibmesa3-dbg_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/libxaw6-dbg_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/libdps1-dbg_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xlibmesa-dev_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/libxaw7-dev_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xlibosmesa3_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xlibosmesa3-dbg_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xterm_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xserver-xfree86_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xfs_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xlibmesa3_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/libxaw6-dev_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xlibosmesa-dev_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/proxymngr_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/xnest_4.1.0-16woody5_ia64.deb
stable/main/binary-ia64/twm_4.1.0-16woody5_ia64.deb
xfree86 (4.1.0-16woody5) stable-security; urgency=low
  * Security update release.  Resolves the following issue:
    + CAN-2004-0914: memory leak, improper use of signed integers, and
      overflow corrections in the Xpm library
  * Resync offset in patch #400.


stable/main/binary-i386/libdps1-dbg_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xlibosmesa-dev_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xfwp_4.1.0-16woody5_i386.deb
stable/main/binary-i386/libxaw6_4.1.0-16woody5_i386.deb
stable/main/binary-i386/libxaw7_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xserver-common_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xserver-xfree86_4.1.0-16woody5_i386.deb
stable/main/binary-i386/proxymngr_4.1.0-16woody5_i386.deb
stable/main/binary-i386/libxaw7-dev_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xvfb_4.1.0-16woody5_i386.deb
stable/main/binary-i386/libxaw6-dev_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xlibmesa3-dbg_4.1.0-16woody5_i386.deb
stable/main/binary-i386/x-window-system-core_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xlibs-pic_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xlibosmesa3_4.1.0-16woody5_i386.deb
stable/main/binary-i386/libdps-dev_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xlibosmesa3-dbg_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xlibmesa3_4.1.0-16woody5_i386.deb
stable/main/binary-i386/lbxproxy_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xbase-clients_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xlibs-dev_4.1.0-16woody5_i386.deb
stable/main/binary-i386/twm_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xmh_4.1.0-16woody5_i386.deb
stable/main/binary-i386/libxaw6-dbg_4.1.0-16woody5_i386.deb
stable/main/binary-i386/libdps1_4.1.0-16woody5_i386.deb
stable/main/binary-i386/libxaw7-dbg_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xnest_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xlibs_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xprt_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xutils_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xlibs-dbg_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xdm_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xterm_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xfs_4.1.0-16woody5_i386.deb
stable/main/binary-i386/xlibmesa-dev_4.1.0-16woody5_i386.deb
xfree86 (4.1.0-16woody5) stable-security; urgency=low
  * Security update release.  Resolves the following issue:
    + CAN-2004-0914: memory leak, improper use of signed integers, and
      overflow corrections in the Xpm library
  * Resync offset in patch #400.


stable/main/binary-hppa/xlibmesa-dev_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/xdm_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/xbase-clients_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/libxaw6-dbg_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/libdps-dev_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/xlibs-dbg_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/xnest_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/libdps1_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/libdps1-dbg_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/x-window-system-core_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/xfs_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/xlibmesa3-dbg_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/xvfb_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/xserver-xfree86_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/libxaw6-dev_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/libxaw7_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/xmh_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/libxaw6_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/xfwp_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/lbxproxy_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/xlibs_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/xterm_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/xlibs-dev_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/proxymngr_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/libxaw7-dbg_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/xutils_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/xserver-common_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/xlibs-pic_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/libxaw7-dev_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/twm_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/xlibmesa3_4.1.0-16woody5_hppa.deb
stable/main/binary-hppa/xprt_4.1.0-16woody5_hppa.deb
xfree86 (4.1.0-16woody5) stable-security; urgency=low
  * Security update release.  Resolves the following issue:
    + CAN-2004-0914: memory leak, improper use of signed integers, and
      overflow corrections in the Xpm library
  * Resync offset in patch #400.


stable/main/binary-arm/lbxproxy_4.1.0-16woody5_arm.deb
stable/main/binary-arm/libdps1-dbg_4.1.0-16woody5_arm.deb
stable/main/binary-arm/xserver-xfree86_4.1.0-16woody5_arm.deb
stable/main/binary-arm/xnest_4.1.0-16woody5_arm.deb
stable/main/binary-arm/xutils_4.1.0-16woody5_arm.deb
stable/main/binary-arm/twm_4.1.0-16woody5_arm.deb
stable/main/binary-arm/xdm_4.1.0-16woody5_arm.deb
stable/main/binary-arm/xserver-common_4.1.0-16woody5_arm.deb
stable/main/binary-arm/xfwp_4.1.0-16woody5_arm.deb
stable/main/binary-arm/libxaw7-dbg_4.1.0-16woody5_arm.deb
stable/main/binary-arm/x-window-system-core_4.1.0-16woody5_arm.deb
stable/main/binary-arm/xlibs-pic_4.1.0-16woody5_arm.deb
stable/main/binary-arm/xprt_4.1.0-16woody5_arm.deb
stable/main/binary-arm/xlibmesa3_4.1.0-16woody5_arm.deb
stable/main/binary-arm/xlibs_4.1.0-16woody5_arm.deb
stable/main/binary-arm/xterm_4.1.0-16woody5_arm.deb
stable/main/binary-arm/xfs_4.1.0-16woody5_arm.deb
stable/main/binary-arm/libdps-dev_4.1.0-16woody5_arm.deb
stable/main/binary-arm/xvfb_4.1.0-16woody5_arm.deb
stable/main/binary-arm/xbase-clients_4.1.0-16woody5_arm.deb
stable/main/binary-arm/libdps1_4.1.0-16woody5_arm.deb
stable/main/binary-arm/proxymngr_4.1.0-16woody5_arm.deb
stable/main/binary-arm/xlibmesa-dev_4.1.0-16woody5_arm.deb
stable/main/binary-arm/libxaw6-dbg_4.1.0-16woody5_arm.deb
stable/main/binary-arm/libxaw7-dev_4.1.0-16woody5_arm.deb
stable/main/binary-arm/xmh_4.1.0-16woody5_arm.deb
stable/main/binary-arm/xlibs-dev_4.1.0-16woody5_arm.deb
stable/main/binary-arm/libxaw6-dev_4.1.0-16woody5_arm.deb
stable/main/binary-arm/xlibs-dbg_4.1.0-16woody5_arm.deb
stable/main/binary-arm/libxaw6_4.1.0-16woody5_arm.deb
stable/main/binary-arm/xlibmesa3-dbg_4.1.0-16woody5_arm.deb
stable/main/binary-arm/libxaw7_4.1.0-16woody5_arm.deb
xfree86 (4.1.0-16woody5) stable-security; urgency=low
  * Security update release.  Resolves the following issue:
    + CAN-2004-0914: memory leak, improper use of signed integers, and
      overflow corrections in the Xpm library
  * Resync offset in patch #400.


stable/main/binary-alpha/libxaw6_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xlibosmesa3_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xlibs-dbg_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/lbxproxy_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xterm_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xlibs-dev_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xutils_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xlibs-pic_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xnest_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/libxaw7-dev_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xlibosmesa3-dbg_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xprt_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xbase-clients_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xlibmesa3_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/libdps1-dbg_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/twm_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xlibosmesa-dev_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/libxaw6-dev_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/x-window-system-core_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/libdps-dev_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xlibmesa3-dbg_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/libdps1_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xserver-common_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xdm_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xlibs_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xserver-xfree86_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xvfb_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/proxymngr_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/libxaw7-dbg_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xlibmesa-dev_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/libxaw6-dbg_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xfwp_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xmh_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/libxaw7_4.1.0-16woody5_alpha.deb
stable/main/binary-alpha/xfs_4.1.0-16woody5_alpha.deb
xfree86 (4.1.0-16woody5) stable-security; urgency=low
  * Security update release.  Resolves the following issue:
    + CAN-2004-0914: memory leak, improper use of signed integers, and
      overflow corrections in the Xpm library
  * Resync offset in patch #400.


stable/main/binary-powerpc/xbase-clients_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/xnest_4.1.0-16woody5_powerpc.deb
stable/main/source/xfree86_4.1.0-16woody5.diff.gz
stable/main/binary-powerpc/xlibosmesa3-dbg_4.1.0-16woody5_powerpc.deb
stable/main/source/xfree86_4.1.0-16woody5.dsc
stable/main/binary-all/xfonts-scalable_4.1.0-16woody5_all.deb
stable/main/binary-all/xlib6g_4.1.0-16woody5_all.deb
stable/main/binary-powerpc/xlibmesa3_4.1.0-16woody5_powerpc.deb
stable/main/binary-all/xfonts-base-transcoded_4.1.0-16woody5_all.deb
stable/main/binary-powerpc/libdps1_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/xdm_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/xlibosmesa3_4.1.0-16woody5_powerpc.deb
stable/main/binary-all/xspecs_4.1.0-16woody5_all.deb
stable/main/binary-powerpc/proxymngr_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/xlibmesa3-dbg_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/libxaw6-dbg_4.1.0-16woody5_powerpc.deb
stable/main/binary-all/xfonts-pex_4.1.0-16woody5_all.deb
stable/main/binary-powerpc/libdps-dev_4.1.0-16woody5_powerpc.deb
stable/main/binary-all/xfree86-common_4.1.0-16woody5_all.deb
stable/main/binary-powerpc/libxaw7_4.1.0-16woody5_powerpc.deb
stable/main/binary-all/xfonts-75dpi-transcoded_4.1.0-16woody5_all.deb
stable/main/binary-powerpc/xfs_4.1.0-16woody5_powerpc.deb
stable/main/binary-all/xlib6g-dev_4.1.0-16woody5_all.deb
stable/main/binary-all/xfonts-cyrillic_4.1.0-16woody5_all.deb
stable/main/binary-powerpc/xlibs_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/lbxproxy_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/x-window-system-core_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/xlibosmesa-dev_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/xvfb_4.1.0-16woody5_powerpc.deb
stable/main/binary-all/xfonts-base_4.1.0-16woody5_all.deb
stable/main/binary-all/xfonts-100dpi_4.1.0-16woody5_all.deb
stable/main/binary-powerpc/libxaw6_4.1.0-16woody5_powerpc.deb
stable/main/binary-all/x-window-system_4.1.0-16woody5_all.deb
stable/main/binary-powerpc/libxaw7-dbg_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/xprt_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/xterm_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/xfwp_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/xmh_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/xutils_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/xserver-common_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/xserver-xfree86_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/xlibs-dev_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/xlibmesa-dev_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/libxaw6-dev_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/xlibs-dbg_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/xlibs-pic_4.1.0-16woody5_powerpc.deb
stable/main/binary-all/xfonts-100dpi-transcoded_4.1.0-16woody5_all.deb
stable/main/binary-powerpc/twm_4.1.0-16woody5_powerpc.deb
stable/main/binary-all/xfonts-75dpi_4.1.0-16woody5_all.deb
stable/main/binary-powerpc/libdps1-dbg_4.1.0-16woody5_powerpc.deb
stable/main/binary-powerpc/libxaw7-dev_4.1.0-16woody5_powerpc.deb
xfree86 (4.1.0-16woody5) stable-security; urgency=low
  * Security update release.  Resolves the following issue:
    + CAN-2004-0914: memory leak, improper use of signed integers, and
      overflow corrections in the Xpm library
  * Resync offset in patch #400.


stable/main/binary-sparc/xaos_3.0-23.woody2_sparc.deb
xaos (3.0-23.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Bumped the version number so it is higher than 3.0-23woody1 and
    3.0-23.0.1 (binNMU for S/390).
  * No code changes


stable/main/binary-s390/xaos_3.0-23.woody2_s390.deb
xaos (3.0-23.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Bumped the version number so it is higher than 3.0-23woody1 and
    3.0-23.0.1 (binNMU for S/390).
  * No code changes


stable/main/binary-powerpc/xaos_3.0-23.woody2_powerpc.deb
xaos (3.0-23.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Bumped the version number so it is higher than 3.0-23woody1 and
    3.0-23.0.1 (binNMU for S/390).
  * No code changes


stable/main/binary-mipsel/xaos_3.0-23.woody2_mipsel.deb
xaos (3.0-23.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Bumped the version number so it is higher than 3.0-23woody1 and
    3.0-23.0.1 (binNMU for S/390).
  * No code changes


stable/main/binary-mips/xaos_3.0-23.woody2_mips.deb
xaos (3.0-23.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Bumped the version number so it is higher than 3.0-23woody1 and
    3.0-23.0.1 (binNMU for S/390).
  * No code changes


stable/main/binary-m68k/xaos_3.0-23.woody2_m68k.deb
xaos (3.0-23.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Bumped the version number so it is higher than 3.0-23woody1 and
    3.0-23.0.1 (binNMU for S/390).
  * No code changes


stable/main/binary-ia64/xaos_3.0-23.woody2_ia64.deb
xaos (3.0-23.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Bumped the version number so it is higher than 3.0-23woody1 and
    3.0-23.0.1 (binNMU for S/390).
  * No code changes


stable/main/binary-hppa/xaos_3.0-23.woody2_hppa.deb
xaos (3.0-23.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Bumped the version number so it is higher than 3.0-23woody1 and
    3.0-23.0.1 (binNMU for S/390).
  * No code changes


stable/main/binary-arm/xaos_3.0-23.woody2_arm.deb
xaos (3.0-23.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Bumped the version number so it is higher than 3.0-23woody1 and
    3.0-23.0.1 (binNMU for S/390).
  * No code changes


stable/main/binary-alpha/xaos_3.0-23.woody2_alpha.deb
xaos (3.0-23.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Bumped the version number so it is higher than 3.0-23woody1 and
    3.0-23.0.1 (binNMU for S/390).
  * No code changes


stable/main/source/xaos_3.0-23.woody2.diff.gz
stable/main/binary-i386/xaos_3.0-23.woody2_i386.deb
stable/main/source/xaos_3.0-23.woody2.dsc
xaos (3.0-23.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Bumped the version number so it is higher than 3.0-23woody1 and
    3.0-23.0.1 (binNMU for S/390).
  * No code changes


stable/main/source/viewcvs_0.9.2-4woody1.diff.gz
stable/main/binary-all/viewcvs_0.9.2-4woody1_all.deb
stable/main/source/viewcvs_0.9.2-4woody1.dsc
viewcvs (0.9.2-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected code to honor hide_cvsroot and forbidden when making a
    tarball [lib/viewcvs.py, CAN-2004-0915]


stable/main/binary-sparc/libtiff3g-dev_3.5.5-6.woody3_sparc.deb
stable/main/binary-sparc/libtiff-tools_3.5.5-6.woody3_sparc.deb
stable/main/binary-sparc/libtiff3g_3.5.5-6.woody3_sparc.deb
tiff (3.5.5-6.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added fix to prevent buffer overflows [libtiff/tif_dirread.c,
    libtiff/tif_fax3.c, CAN-2004-1308]


stable/main/binary-s390/libtiff3g_3.5.5-6.woody3_s390.deb
stable/main/binary-s390/libtiff-tools_3.5.5-6.woody3_s390.deb
stable/main/binary-s390/libtiff3g-dev_3.5.5-6.woody3_s390.deb
tiff (3.5.5-6.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added fix to prevent buffer overflows [libtiff/tif_dirread.c,
    libtiff/tif_fax3.c, CAN-2004-1308]


stable/main/binary-powerpc/libtiff3g_3.5.5-6.woody3_powerpc.deb
stable/main/binary-powerpc/libtiff3g-dev_3.5.5-6.woody3_powerpc.deb
stable/main/binary-powerpc/libtiff-tools_3.5.5-6.woody3_powerpc.deb
tiff (3.5.5-6.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added fix to prevent buffer overflows [libtiff/tif_dirread.c,
    libtiff/tif_fax3.c, CAN-2004-1308]


stable/main/binary-mips/libtiff-tools_3.5.5-6.woody3_mips.deb
stable/main/binary-mips/libtiff3g_3.5.5-6.woody3_mips.deb
stable/main/binary-mips/libtiff3g-dev_3.5.5-6.woody3_mips.deb
tiff (3.5.5-6.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added fix to prevent buffer overflows [libtiff/tif_dirread.c,
    libtiff/tif_fax3.c, CAN-2004-1308]


stable/main/binary-m68k/libtiff3g_3.5.5-6.woody3_m68k.deb
stable/main/binary-m68k/libtiff-tools_3.5.5-6.woody3_m68k.deb
stable/main/binary-m68k/libtiff3g-dev_3.5.5-6.woody3_m68k.deb
tiff (3.5.5-6.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added fix to prevent buffer overflows [libtiff/tif_dirread.c,
    libtiff/tif_fax3.c, CAN-2004-1308]


stable/main/binary-ia64/libtiff3g-dev_3.5.5-6.woody3_ia64.deb
stable/main/binary-ia64/libtiff-tools_3.5.5-6.woody3_ia64.deb
stable/main/binary-ia64/libtiff3g_3.5.5-6.woody3_ia64.deb
tiff (3.5.5-6.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added fix to prevent buffer overflows [libtiff/tif_dirread.c,
    libtiff/tif_fax3.c, CAN-2004-1308]


stable/main/binary-i386/libtiff3g-dev_3.5.5-6.woody3_i386.deb
stable/main/binary-i386/libtiff-tools_3.5.5-6.woody3_i386.deb
stable/main/binary-i386/libtiff3g_3.5.5-6.woody3_i386.deb
tiff (3.5.5-6.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added fix to prevent buffer overflows [libtiff/tif_dirread.c,
    libtiff/tif_fax3.c, CAN-2004-1308]


stable/main/binary-hppa/libtiff-tools_3.5.5-6.woody3_hppa.deb
stable/main/binary-hppa/libtiff3g_3.5.5-6.woody3_hppa.deb
stable/main/binary-hppa/libtiff3g-dev_3.5.5-6.woody3_hppa.deb
tiff (3.5.5-6.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added fix to prevent buffer overflows [libtiff/tif_dirread.c,
    libtiff/tif_fax3.c, CAN-2004-1308]


stable/main/binary-arm/libtiff-tools_3.5.5-6.woody3_arm.deb
stable/main/binary-arm/libtiff3g-dev_3.5.5-6.woody3_arm.deb
stable/main/binary-arm/libtiff3g_3.5.5-6.woody3_arm.deb
tiff (3.5.5-6.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added fix to prevent buffer overflows [libtiff/tif_dirread.c,
    libtiff/tif_fax3.c, CAN-2004-1308]


stable/main/binary-alpha/libtiff3g_3.5.5-6.woody3_alpha.deb
stable/main/binary-alpha/libtiff-tools_3.5.5-6.woody3_alpha.deb
stable/main/binary-alpha/libtiff3g-dev_3.5.5-6.woody3_alpha.deb
tiff (3.5.5-6.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added fix to prevent buffer overflows [libtiff/tif_dirread.c,
    libtiff/tif_fax3.c, CAN-2004-1308]


stable/main/binary-mipsel/libtiff-tools_3.5.5-6.woody3_mipsel.deb
stable/main/source/tiff_3.5.5-6.woody3.dsc
stable/main/binary-mipsel/libtiff3g_3.5.5-6.woody3_mipsel.deb
stable/main/binary-mipsel/libtiff3g-dev_3.5.5-6.woody3_mipsel.deb
stable/main/source/tiff_3.5.5-6.woody3.diff.gz
tiff (3.5.5-6.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added fix to prevent buffer overflows [libtiff/tif_dirread.c,
    libtiff/tif_fax3.c, CAN-2004-1308]


stable/main/binary-sparc/libkpathsea-dev_1.0.7+20011202-7.3_sparc.deb
stable/main/binary-sparc/libkpathsea3_1.0.7+20011202-7.3_sparc.deb
stable/main/binary-sparc/tetex-bin_1.0.7+20011202-7.3_sparc.deb
tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported more fixes for several integer overflows in the xpdf
    library included in tetex-bin, thanks to Frank Küster
    <frank@debian.org> [libs/xpdf/xpdf/XRef.cc]
  * Changed arguments to size_t instead of int for several functions
    [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h]


stable/main/binary-s390/libkpathsea3_1.0.7+20011202-7.3_s390.deb
stable/main/binary-s390/libkpathsea-dev_1.0.7+20011202-7.3_s390.deb
stable/main/binary-s390/tetex-bin_1.0.7+20011202-7.3_s390.deb
tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported more fixes for several integer overflows in the xpdf
    library included in tetex-bin, thanks to Frank Küster
    <frank@debian.org> [libs/xpdf/xpdf/XRef.cc]
  * Changed arguments to size_t instead of int for several functions
    [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h]


stable/main/binary-powerpc/libkpathsea-dev_1.0.7+20011202-7.3_powerpc.deb
stable/main/binary-powerpc/libkpathsea3_1.0.7+20011202-7.3_powerpc.deb
stable/main/binary-powerpc/tetex-bin_1.0.7+20011202-7.3_powerpc.deb
tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported more fixes for several integer overflows in the xpdf
    library included in tetex-bin, thanks to Frank Küster
    <frank@debian.org> [libs/xpdf/xpdf/XRef.cc]
  * Changed arguments to size_t instead of int for several functions
    [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h]


stable/main/binary-mips/libkpathsea-dev_1.0.7+20011202-7.3_mips.deb
stable/main/binary-mips/tetex-bin_1.0.7+20011202-7.3_mips.deb
stable/main/binary-mips/libkpathsea3_1.0.7+20011202-7.3_mips.deb
tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported more fixes for several integer overflows in the xpdf
    library included in tetex-bin, thanks to Frank Küster
    <frank@debian.org> [libs/xpdf/xpdf/XRef.cc]
  * Changed arguments to size_t instead of int for several functions
    [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h]


stable/main/binary-m68k/libkpathsea-dev_1.0.7+20011202-7.3_m68k.deb
stable/main/binary-m68k/libkpathsea3_1.0.7+20011202-7.3_m68k.deb
stable/main/binary-m68k/tetex-bin_1.0.7+20011202-7.3_m68k.deb
tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported more fixes for several integer overflows in the xpdf
    library included in tetex-bin, thanks to Frank Küster
    <frank@debian.org> [libs/xpdf/xpdf/XRef.cc]
  * Changed arguments to size_t instead of int for several functions
    [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h]


stable/main/binary-ia64/libkpathsea-dev_1.0.7+20011202-7.3_ia64.deb
stable/main/binary-ia64/libkpathsea3_1.0.7+20011202-7.3_ia64.deb
stable/main/binary-ia64/tetex-bin_1.0.7+20011202-7.3_ia64.deb
tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported more fixes for several integer overflows in the xpdf
    library included in tetex-bin, thanks to Frank Küster
    <frank@debian.org> [libs/xpdf/xpdf/XRef.cc]
  * Changed arguments to size_t instead of int for several functions
    [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h]


stable/main/binary-i386/tetex-bin_1.0.7+20011202-7.3_i386.deb
stable/main/binary-i386/libkpathsea3_1.0.7+20011202-7.3_i386.deb
stable/main/binary-i386/libkpathsea-dev_1.0.7+20011202-7.3_i386.deb
tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported more fixes for several integer overflows in the xpdf
    library included in tetex-bin, thanks to Frank Küster
    <frank@debian.org> [libs/xpdf/xpdf/XRef.cc]
  * Changed arguments to size_t instead of int for several functions
    [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h]


stable/main/binary-hppa/libkpathsea-dev_1.0.7+20011202-7.3_hppa.deb
stable/main/binary-hppa/libkpathsea3_1.0.7+20011202-7.3_hppa.deb
stable/main/binary-hppa/tetex-bin_1.0.7+20011202-7.3_hppa.deb
tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported more fixes for several integer overflows in the xpdf
    library included in tetex-bin, thanks to Frank Küster
    <frank@debian.org> [libs/xpdf/xpdf/XRef.cc]
  * Changed arguments to size_t instead of int for several functions
    [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h]


stable/main/binary-arm/tetex-bin_1.0.7+20011202-7.3_arm.deb
stable/main/binary-arm/libkpathsea3_1.0.7+20011202-7.3_arm.deb
stable/main/binary-arm/libkpathsea-dev_1.0.7+20011202-7.3_arm.deb
tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported more fixes for several integer overflows in the xpdf
    library included in tetex-bin, thanks to Frank Küster
    <frank@debian.org> [libs/xpdf/xpdf/XRef.cc]
  * Changed arguments to size_t instead of int for several functions
    [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h]


stable/main/binary-alpha/libkpathsea3_1.0.7+20011202-7.3_alpha.deb
stable/main/binary-alpha/tetex-bin_1.0.7+20011202-7.3_alpha.deb
stable/main/binary-alpha/libkpathsea-dev_1.0.7+20011202-7.3_alpha.deb
tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported more fixes for several integer overflows in the xpdf
    library included in tetex-bin, thanks to Frank Küster
    <frank@debian.org> [libs/xpdf/xpdf/XRef.cc]
  * Changed arguments to size_t instead of int for several functions
    [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h]


stable/main/binary-mipsel/libkpathsea-dev_1.0.7+20011202-7.3_mipsel.deb
stable/main/binary-mipsel/tetex-bin_1.0.7+20011202-7.3_mipsel.deb
stable/main/source/tetex-bin_1.0.7+20011202-7.3.dsc
stable/main/source/tetex-bin_1.0.7+20011202-7.3.tar.gz
stable/main/binary-mipsel/libkpathsea3_1.0.7+20011202-7.3_mipsel.deb
tetex-bin (1.0.7+20011202-7.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported more fixes for several integer overflows in the xpdf
    library included in tetex-bin, thanks to Frank Küster
    <frank@debian.org> [libs/xpdf/xpdf/XRef.cc]
  * Changed arguments to size_t instead of int for several functions
    [libs/xpdf/goo/gmem.c, libs/xpdf/goo/gmem.h]


stable/main/binary-sparc/sudo_1.6.6-1.3_sparc.deb
sudo (1.6.6-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed debugging code again.  Sorry.


stable/main/binary-s390/sudo_1.6.6-1.3_s390.deb
sudo (1.6.6-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed debugging code again.  Sorry.


stable/main/binary-powerpc/sudo_1.6.6-1.3_powerpc.deb
sudo (1.6.6-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed debugging code again.  Sorry.


stable/main/binary-mips/sudo_1.6.6-1.3_mips.deb
sudo (1.6.6-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed debugging code again.  Sorry.


stable/main/binary-m68k/sudo_1.6.6-1.3_m68k.deb
sudo (1.6.6-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed debugging code again.  Sorry.


stable/main/binary-ia64/sudo_1.6.6-1.3_ia64.deb
sudo (1.6.6-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed debugging code again.  Sorry.


stable/main/binary-i386/sudo_1.6.6-1.3_i386.deb
sudo (1.6.6-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed debugging code again.  Sorry.


stable/main/binary-hppa/sudo_1.6.6-1.3_hppa.deb
sudo (1.6.6-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed debugging code again.  Sorry.


stable/main/binary-arm/sudo_1.6.6-1.3_arm.deb
sudo (1.6.6-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed debugging code again.  Sorry.


stable/main/binary-alpha/sudo_1.6.6-1.3_alpha.deb
sudo (1.6.6-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed debugging code again.  Sorry.


stable/main/binary-mipsel/sudo_1.6.6-1.3_mipsel.deb
stable/main/source/sudo_1.6.6-1.3.dsc
stable/main/source/sudo_1.6.6-1.3.diff.gz
sudo (1.6.6-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Removed debugging code again.  Sorry.


stable/main/binary-sparc/squid_2.4.6-2woody4_sparc.deb
stable/main/binary-sparc/squid-cgi_2.4.6-2woody4_sparc.deb
stable/main/binary-sparc/squidclient_2.4.6-2woody4_sparc.deb
squid (2.4.6-2woody4) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for CAN-2004-0918
      o squid-2.5.STABLE6-SNMP_core_dump.patch


stable/main/binary-s390/squid_2.4.6-2woody4_s390.deb
stable/main/binary-s390/squid-cgi_2.4.6-2woody4_s390.deb
stable/main/binary-s390/squidclient_2.4.6-2woody4_s390.deb
squid (2.4.6-2woody4) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for CAN-2004-0918
      o squid-2.5.STABLE6-SNMP_core_dump.patch


stable/main/binary-powerpc/squid_2.4.6-2woody4_powerpc.deb
stable/main/binary-powerpc/squidclient_2.4.6-2woody4_powerpc.deb
stable/main/binary-powerpc/squid-cgi_2.4.6-2woody4_powerpc.deb
squid (2.4.6-2woody4) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for CAN-2004-0918
      o squid-2.5.STABLE6-SNMP_core_dump.patch


stable/main/binary-mips/squid_2.4.6-2woody4_mips.deb
stable/main/binary-mips/squidclient_2.4.6-2woody4_mips.deb
stable/main/binary-mips/squid-cgi_2.4.6-2woody4_mips.deb
squid (2.4.6-2woody4) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for CAN-2004-0918
      o squid-2.5.STABLE6-SNMP_core_dump.patch


stable/main/binary-m68k/squidclient_2.4.6-2woody4_m68k.deb
stable/main/binary-m68k/squid_2.4.6-2woody4_m68k.deb
stable/main/binary-m68k/squid-cgi_2.4.6-2woody4_m68k.deb
squid (2.4.6-2woody4) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for CAN-2004-0918
      o squid-2.5.STABLE6-SNMP_core_dump.patch


stable/main/binary-ia64/squidclient_2.4.6-2woody4_ia64.deb
stable/main/binary-ia64/squid-cgi_2.4.6-2woody4_ia64.deb
stable/main/binary-ia64/squid_2.4.6-2woody4_ia64.deb
squid (2.4.6-2woody4) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for CAN-2004-0918
      o squid-2.5.STABLE6-SNMP_core_dump.patch


stable/main/binary-i386/squid-cgi_2.4.6-2woody4_i386.deb
stable/main/binary-i386/squidclient_2.4.6-2woody4_i386.deb
stable/main/binary-i386/squid_2.4.6-2woody4_i386.deb
squid (2.4.6-2woody4) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for CAN-2004-0918
      o squid-2.5.STABLE6-SNMP_core_dump.patch


stable/main/binary-hppa/squid_2.4.6-2woody4_hppa.deb
stable/main/binary-hppa/squidclient_2.4.6-2woody4_hppa.deb
stable/main/binary-hppa/squid-cgi_2.4.6-2woody4_hppa.deb
squid (2.4.6-2woody4) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for CAN-2004-0918
      o squid-2.5.STABLE6-SNMP_core_dump.patch


stable/main/binary-arm/squid-cgi_2.4.6-2woody4_arm.deb
stable/main/binary-arm/squidclient_2.4.6-2woody4_arm.deb
stable/main/binary-arm/squid_2.4.6-2woody4_arm.deb
squid (2.4.6-2woody4) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for CAN-2004-0918
      o squid-2.5.STABLE6-SNMP_core_dump.patch


stable/main/binary-alpha/squidclient_2.4.6-2woody4_alpha.deb
stable/main/binary-alpha/squid_2.4.6-2woody4_alpha.deb
stable/main/binary-alpha/squid-cgi_2.4.6-2woody4_alpha.deb
squid (2.4.6-2woody4) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for CAN-2004-0918
      o squid-2.5.STABLE6-SNMP_core_dump.patch


stable/main/binary-mipsel/squidclient_2.4.6-2woody4_mipsel.deb
stable/main/binary-mipsel/squid-cgi_2.4.6-2woody4_mipsel.deb
stable/main/source/squid_2.4.6-2woody4.dsc
stable/main/binary-mipsel/squid_2.4.6-2woody4_mipsel.deb
stable/main/source/squid_2.4.6-2woody4.diff.gz
squid (2.4.6-2woody4) stable-security; urgency=high
  * Upload to stable-security because of security issues
  * Added upstream patch for CAN-2004-0918
      o squid-2.5.STABLE6-SNMP_core_dump.patch


stable/main/binary-sparc/passwd_20000902-12woody1_sparc.deb
stable/main/binary-sparc/login_20000902-12woody1_sparc.deb
shadow (20000902-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted password check to fix authentication bypass
    [debian/patches/036_CAN-2004-1001_passwd_check]


stable/main/binary-s390/passwd_20000902-12woody1_s390.deb
stable/main/binary-s390/login_20000902-12woody1_s390.deb
shadow (20000902-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted password check to fix authentication bypass
    [debian/patches/036_CAN-2004-1001_passwd_check]


stable/main/binary-powerpc/passwd_20000902-12woody1_powerpc.deb
stable/main/binary-powerpc/login_20000902-12woody1_powerpc.deb
shadow (20000902-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted password check to fix authentication bypass
    [debian/patches/036_CAN-2004-1001_passwd_check]


stable/main/binary-mips/passwd_20000902-12woody1_mips.deb
stable/main/binary-mips/login_20000902-12woody1_mips.deb
shadow (20000902-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted password check to fix authentication bypass
    [debian/patches/036_CAN-2004-1001_passwd_check]


stable/main/binary-m68k/login_20000902-12woody1_m68k.deb
stable/main/binary-m68k/passwd_20000902-12woody1_m68k.deb
shadow (20000902-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted password check to fix authentication bypass
    [debian/patches/036_CAN-2004-1001_passwd_check]


stable/main/binary-ia64/passwd_20000902-12woody1_ia64.deb
stable/main/binary-ia64/login_20000902-12woody1_ia64.deb
shadow (20000902-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted password check to fix authentication bypass
    [debian/patches/036_CAN-2004-1001_passwd_check]


stable/main/binary-i386/login_20000902-12woody1_i386.deb
stable/main/binary-i386/passwd_20000902-12woody1_i386.deb
shadow (20000902-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted password check to fix authentication bypass
    [debian/patches/036_CAN-2004-1001_passwd_check]


stable/main/binary-hppa/passwd_20000902-12woody1_hppa.deb
stable/main/binary-hppa/login_20000902-12woody1_hppa.deb
shadow (20000902-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted password check to fix authentication bypass
    [debian/patches/036_CAN-2004-1001_passwd_check]


stable/main/binary-arm/login_20000902-12woody1_arm.deb
stable/main/binary-arm/passwd_20000902-12woody1_arm.deb
shadow (20000902-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted password check to fix authentication bypass
    [debian/patches/036_CAN-2004-1001_passwd_check]


stable/main/binary-alpha/login_20000902-12woody1_alpha.deb
stable/main/binary-alpha/passwd_20000902-12woody1_alpha.deb
shadow (20000902-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted password check to fix authentication bypass
    [debian/patches/036_CAN-2004-1001_passwd_check]


stable/main/source/shadow_20000902-12woody1.dsc
stable/main/binary-mipsel/passwd_20000902-12woody1_mipsel.deb
stable/main/source/shadow_20000902-12woody1.diff.gz
stable/main/binary-mipsel/login_20000902-12woody1_mipsel.deb
shadow (20000902-12woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted password check to fix authentication bypass
    [debian/patches/036_CAN-2004-1001_passwd_check]


stable/main/binary-sparc/libruby_1.6.7-3woody4_sparc.deb
stable/main/binary-sparc/ruby_1.6.7-3woody4_sparc.deb
stable/main/binary-sparc/libreadline-ruby_1.6.7-3woody4_sparc.deb
stable/main/binary-sparc/libtcltk-ruby_1.6.7-3woody4_sparc.deb
stable/main/binary-sparc/libpty-ruby_1.6.7-3woody4_sparc.deb
stable/main/binary-sparc/libtk-ruby_1.6.7-3woody4_sparc.deb
stable/main/binary-sparc/ruby-dev_1.6.7-3woody4_sparc.deb
stable/main/binary-sparc/libsyslog-ruby_1.6.7-3woody4_sparc.deb
stable/main/binary-sparc/libnkf-ruby_1.6.7-3woody4_sparc.deb
stable/main/binary-sparc/libsdbm-ruby_1.6.7-3woody4_sparc.deb
stable/main/binary-sparc/libcurses-ruby_1.6.7-3woody4_sparc.deb
stable/main/binary-sparc/libgdbm-ruby_1.6.7-3woody4_sparc.deb
stable/main/binary-sparc/libdbm-ruby_1.6.7-3woody4_sparc.deb
ruby (1.6.7-3woody4) stable-security; urgency=high
  * added debian/patches/811_cgi.patch:
      - When CGI.rb receives wrong POST request, it will get into an infinite
        loop.


stable/main/binary-s390/libgdbm-ruby_1.6.7-3woody4_s390.deb
stable/main/binary-s390/libpty-ruby_1.6.7-3woody4_s390.deb
stable/main/binary-s390/libtcltk-ruby_1.6.7-3woody4_s390.deb
stable/main/binary-s390/libsyslog-ruby_1.6.7-3woody4_s390.deb
stable/main/binary-s390/libtk-ruby_1.6.7-3woody4_s390.deb
stable/main/binary-s390/libruby_1.6.7-3woody4_s390.deb
stable/main/binary-s390/libreadline-ruby_1.6.7-3woody4_s390.deb
stable/main/binary-s390/ruby-dev_1.6.7-3woody4_s390.deb
stable/main/binary-s390/libcurses-ruby_1.6.7-3woody4_s390.deb
stable/main/binary-s390/libdbm-ruby_1.6.7-3woody4_s390.deb
stable/main/binary-s390/ruby_1.6.7-3woody4_s390.deb
stable/main/binary-s390/libsdbm-ruby_1.6.7-3woody4_s390.deb
stable/main/binary-s390/libnkf-ruby_1.6.7-3woody4_s390.deb
ruby (1.6.7-3woody4) stable-security; urgency=high
  * added debian/patches/811_cgi.patch:
      - When CGI.rb receives wrong POST request, it will get into an infinite
        loop.


stable/main/binary-powerpc/libtk-ruby_1.6.7-3woody4_powerpc.deb
stable/main/binary-powerpc/libgdbm-ruby_1.6.7-3woody4_powerpc.deb
stable/main/binary-powerpc/ruby-dev_1.6.7-3woody4_powerpc.deb
stable/main/binary-powerpc/libpty-ruby_1.6.7-3woody4_powerpc.deb
stable/main/binary-powerpc/libruby_1.6.7-3woody4_powerpc.deb
stable/main/binary-powerpc/libsdbm-ruby_1.6.7-3woody4_powerpc.deb
stable/main/binary-powerpc/libsyslog-ruby_1.6.7-3woody4_powerpc.deb
stable/main/binary-powerpc/libdbm-ruby_1.6.7-3woody4_powerpc.deb
stable/main/binary-powerpc/ruby_1.6.7-3woody4_powerpc.deb
stable/main/binary-powerpc/libtcltk-ruby_1.6.7-3woody4_powerpc.deb
stable/main/binary-powerpc/libcurses-ruby_1.6.7-3woody4_powerpc.deb
stable/main/binary-powerpc/libreadline-ruby_1.6.7-3woody4_powerpc.deb
stable/main/binary-powerpc/libnkf-ruby_1.6.7-3woody4_powerpc.deb
ruby (1.6.7-3woody4) stable-security; urgency=high
  * added debian/patches/811_cgi.patch:
      - When CGI.rb receives wrong POST request, it will get into an infinite
        loop.


stable/main/binary-mipsel/libruby_1.6.7-3woody4_mipsel.deb
stable/main/binary-mipsel/libdbm-ruby_1.6.7-3woody4_mipsel.deb
stable/main/binary-mipsel/libnkf-ruby_1.6.7-3woody4_mipsel.deb
stable/main/binary-mipsel/libtcltk-ruby_1.6.7-3woody4_mipsel.deb
stable/main/binary-mipsel/libgdbm-ruby_1.6.7-3woody4_mipsel.deb
stable/main/binary-mipsel/libtk-ruby_1.6.7-3woody4_mipsel.deb
stable/main/binary-mipsel/ruby-dev_1.6.7-3woody4_mipsel.deb
stable/main/binary-mipsel/libsyslog-ruby_1.6.7-3woody4_mipsel.deb
stable/main/binary-mipsel/libreadline-ruby_1.6.7-3woody4_mipsel.deb
stable/main/binary-mipsel/libsdbm-ruby_1.6.7-3woody4_mipsel.deb
stable/main/binary-mipsel/libcurses-ruby_1.6.7-3woody4_mipsel.deb
stable/main/binary-mipsel/libpty-ruby_1.6.7-3woody4_mipsel.deb
stable/main/binary-mipsel/ruby_1.6.7-3woody4_mipsel.deb
ruby (1.6.7-3woody4) stable-security; urgency=high
  * added debian/patches/811_cgi.patch:
      - When CGI.rb receives wrong POST request, it will get into an infinite
        loop.


stable/main/binary-mips/libtk-ruby_1.6.7-3woody4_mips.deb
stable/main/binary-mips/libsyslog-ruby_1.6.7-3woody4_mips.deb
stable/main/binary-mips/libnkf-ruby_1.6.7-3woody4_mips.deb
stable/main/binary-mips/ruby_1.6.7-3woody4_mips.deb
stable/main/binary-mips/ruby-dev_1.6.7-3woody4_mips.deb
stable/main/binary-mips/libgdbm-ruby_1.6.7-3woody4_mips.deb
stable/main/binary-mips/libtcltk-ruby_1.6.7-3woody4_mips.deb
stable/main/binary-mips/libdbm-ruby_1.6.7-3woody4_mips.deb
stable/main/binary-mips/libsdbm-ruby_1.6.7-3woody4_mips.deb
stable/main/binary-mips/libreadline-ruby_1.6.7-3woody4_mips.deb
stable/main/binary-mips/libcurses-ruby_1.6.7-3woody4_mips.deb
stable/main/binary-mips/libruby_1.6.7-3woody4_mips.deb
stable/main/binary-mips/libpty-ruby_1.6.7-3woody4_mips.deb
ruby (1.6.7-3woody4) stable-security; urgency=high
  * added debian/patches/811_cgi.patch:
      - When CGI.rb receives wrong POST request, it will get into an infinite
        loop.


stable/main/binary-m68k/ruby_1.6.7-3woody4_m68k.deb
stable/main/binary-m68k/libsdbm-ruby_1.6.7-3woody4_m68k.deb
stable/main/binary-m68k/libcurses-ruby_1.6.7-3woody4_m68k.deb
stable/main/binary-m68k/libreadline-ruby_1.6.7-3woody4_m68k.deb
stable/main/binary-m68k/libpty-ruby_1.6.7-3woody4_m68k.deb
stable/main/binary-m68k/libsyslog-ruby_1.6.7-3woody4_m68k.deb
stable/main/binary-m68k/libnkf-ruby_1.6.7-3woody4_m68k.deb
stable/main/binary-m68k/libtk-ruby_1.6.7-3woody4_m68k.deb
stable/main/binary-m68k/libdbm-ruby_1.6.7-3woody4_m68k.deb
stable/main/binary-m68k/libtcltk-ruby_1.6.7-3woody4_m68k.deb
stable/main/binary-m68k/libgdbm-ruby_1.6.7-3woody4_m68k.deb
stable/main/binary-m68k/ruby-dev_1.6.7-3woody4_m68k.deb
stable/main/binary-m68k/libruby_1.6.7-3woody4_m68k.deb
ruby (1.6.7-3woody4) stable-security; urgency=high
  * added debian/patches/811_cgi.patch:
      - When CGI.rb receives wrong POST request, it will get into an infinite
        loop.


stable/main/binary-ia64/libreadline-ruby_1.6.7-3woody4_ia64.deb
stable/main/binary-ia64/ruby_1.6.7-3woody4_ia64.deb
stable/main/binary-ia64/libruby_1.6.7-3woody4_ia64.deb
stable/main/binary-ia64/libgdbm-ruby_1.6.7-3woody4_ia64.deb
stable/main/binary-ia64/libcurses-ruby_1.6.7-3woody4_ia64.deb
stable/main/binary-ia64/ruby-dev_1.6.7-3woody4_ia64.deb
stable/main/binary-ia64/libtk-ruby_1.6.7-3woody4_ia64.deb
stable/main/binary-ia64/libdbm-ruby_1.6.7-3woody4_ia64.deb
stable/main/binary-ia64/libtcltk-ruby_1.6.7-3woody4_ia64.deb
stable/main/binary-ia64/libsyslog-ruby_1.6.7-3woody4_ia64.deb
stable/main/binary-ia64/libpty-ruby_1.6.7-3woody4_ia64.deb
stable/main/binary-ia64/libnkf-ruby_1.6.7-3woody4_ia64.deb
stable/main/binary-ia64/libsdbm-ruby_1.6.7-3woody4_ia64.deb
ruby (1.6.7-3woody4) stable-security; urgency=high
  * added debian/patches/811_cgi.patch:
      - When CGI.rb receives wrong POST request, it will get into an infinite
        loop.


stable/main/binary-hppa/libsdbm-ruby_1.6.7-3woody4_hppa.deb
stable/main/binary-hppa/libtcltk-ruby_1.6.7-3woody4_hppa.deb
stable/main/binary-hppa/libcurses-ruby_1.6.7-3woody4_hppa.deb
stable/main/binary-hppa/libdbm-ruby_1.6.7-3woody4_hppa.deb
stable/main/binary-hppa/ruby_1.6.7-3woody4_hppa.deb
stable/main/binary-hppa/ruby-dev_1.6.7-3woody4_hppa.deb
stable/main/binary-hppa/libsyslog-ruby_1.6.7-3woody4_hppa.deb
stable/main/binary-hppa/libruby_1.6.7-3woody4_hppa.deb
stable/main/binary-hppa/libtk-ruby_1.6.7-3woody4_hppa.deb
stable/main/binary-hppa/libgdbm-ruby_1.6.7-3woody4_hppa.deb
stable/main/binary-hppa/libnkf-ruby_1.6.7-3woody4_hppa.deb
stable/main/binary-hppa/libpty-ruby_1.6.7-3woody4_hppa.deb
stable/main/binary-hppa/libreadline-ruby_1.6.7-3woody4_hppa.deb
ruby (1.6.7-3woody4) stable-security; urgency=high
  * added debian/patches/811_cgi.patch:
      - When CGI.rb receives wrong POST request, it will get into an infinite
        loop.


stable/main/binary-arm/libsyslog-ruby_1.6.7-3woody4_arm.deb
stable/main/binary-arm/ruby_1.6.7-3woody4_arm.deb
stable/main/binary-arm/libtk-ruby_1.6.7-3woody4_arm.deb
stable/main/binary-arm/libnkf-ruby_1.6.7-3woody4_arm.deb
stable/main/binary-arm/libpty-ruby_1.6.7-3woody4_arm.deb
stable/main/binary-arm/ruby-dev_1.6.7-3woody4_arm.deb
stable/main/binary-arm/libdbm-ruby_1.6.7-3woody4_arm.deb
stable/main/binary-arm/libreadline-ruby_1.6.7-3woody4_arm.deb
stable/main/binary-arm/libsdbm-ruby_1.6.7-3woody4_arm.deb
stable/main/binary-arm/libruby_1.6.7-3woody4_arm.deb
stable/main/binary-arm/libtcltk-ruby_1.6.7-3woody4_arm.deb
stable/main/binary-arm/libgdbm-ruby_1.6.7-3woody4_arm.deb
stable/main/binary-arm/libcurses-ruby_1.6.7-3woody4_arm.deb
ruby (1.6.7-3woody4) stable-security; urgency=high
  * added debian/patches/811_cgi.patch:
      - When CGI.rb receives wrong POST request, it will get into an infinite
        loop.


stable/main/binary-alpha/libtcltk-ruby_1.6.7-3woody4_alpha.deb
stable/main/binary-alpha/libgdbm-ruby_1.6.7-3woody4_alpha.deb
stable/main/binary-alpha/ruby_1.6.7-3woody4_alpha.deb
stable/main/binary-alpha/libsyslog-ruby_1.6.7-3woody4_alpha.deb
stable/main/binary-alpha/libruby_1.6.7-3woody4_alpha.deb
stable/main/binary-alpha/libpty-ruby_1.6.7-3woody4_alpha.deb
stable/main/binary-alpha/libtk-ruby_1.6.7-3woody4_alpha.deb
stable/main/binary-alpha/ruby-dev_1.6.7-3woody4_alpha.deb
stable/main/binary-alpha/libcurses-ruby_1.6.7-3woody4_alpha.deb
stable/main/binary-alpha/libnkf-ruby_1.6.7-3woody4_alpha.deb
stable/main/binary-alpha/libdbm-ruby_1.6.7-3woody4_alpha.deb
stable/main/binary-alpha/libsdbm-ruby_1.6.7-3woody4_alpha.deb
stable/main/binary-alpha/libreadline-ruby_1.6.7-3woody4_alpha.deb
ruby (1.6.7-3woody4) stable-security; urgency=high
  * added debian/patches/811_cgi.patch:
      - When CGI.rb receives wrong POST request, it will get into an infinite
        loop.


stable/main/binary-i386/libsdbm-ruby_1.6.7-3woody4_i386.deb
stable/main/binary-i386/libdbm-ruby_1.6.7-3woody4_i386.deb
stable/main/binary-all/irb_1.6.7-3woody4_all.deb
stable/main/binary-i386/libnkf-ruby_1.6.7-3woody4_i386.deb
stable/main/binary-i386/ruby_1.6.7-3woody4_i386.deb
stable/main/binary-i386/libtk-ruby_1.6.7-3woody4_i386.deb
stable/main/binary-all/ruby-elisp_1.6.7-3woody4_all.deb
stable/main/source/ruby_1.6.7-3woody4.dsc
stable/main/binary-i386/libruby_1.6.7-3woody4_i386.deb
stable/main/binary-i386/libsyslog-ruby_1.6.7-3woody4_i386.deb
stable/main/binary-i386/libpty-ruby_1.6.7-3woody4_i386.deb
stable/main/binary-all/ruby-examples_1.6.7-3woody4_all.deb
stable/main/source/ruby_1.6.7-3woody4.diff.gz
stable/main/binary-i386/libtcltk-ruby_1.6.7-3woody4_i386.deb
stable/main/binary-i386/ruby-dev_1.6.7-3woody4_i386.deb
stable/main/binary-i386/libreadline-ruby_1.6.7-3woody4_i386.deb
stable/main/binary-i386/libgdbm-ruby_1.6.7-3woody4_i386.deb
stable/main/binary-i386/libcurses-ruby_1.6.7-3woody4_i386.deb
ruby (1.6.7-3woody4) stable-security; urgency=high
  * added debian/patches/811_cgi.patch:
      - When CGI.rb receives wrong POST request, it will get into an infinite
        loop.


stable/main/binary-sparc/rlpr_2.02-7woody1_sparc.deb
rlpr (2.02-7woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in msg() (CAN-2004-0393)
  * Fix buffer overflow vulnerability in msg() (CAN-2004-0454)


stable/main/binary-s390/rlpr_2.02-7woody1_s390.deb
rlpr (2.02-7woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in msg() (CAN-2004-0393)
  * Fix buffer overflow vulnerability in msg() (CAN-2004-0454)


stable/main/binary-powerpc/rlpr_2.02-7woody1_powerpc.deb
rlpr (2.02-7woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in msg() (CAN-2004-0393)
  * Fix buffer overflow vulnerability in msg() (CAN-2004-0454)


stable/main/binary-mipsel/rlpr_2.02-7woody1_mipsel.deb
rlpr (2.02-7woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in msg() (CAN-2004-0393)
  * Fix buffer overflow vulnerability in msg() (CAN-2004-0454)


stable/main/binary-mips/rlpr_2.02-7woody1_mips.deb
rlpr (2.02-7woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in msg() (CAN-2004-0393)
  * Fix buffer overflow vulnerability in msg() (CAN-2004-0454)


stable/main/binary-m68k/rlpr_2.02-7woody1_m68k.deb
rlpr (2.02-7woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in msg() (CAN-2004-0393)
  * Fix buffer overflow vulnerability in msg() (CAN-2004-0454)


stable/main/binary-ia64/rlpr_2.02-7woody1_ia64.deb
rlpr (2.02-7woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in msg() (CAN-2004-0393)
  * Fix buffer overflow vulnerability in msg() (CAN-2004-0454)


stable/main/binary-hppa/rlpr_2.02-7woody1_hppa.deb
rlpr (2.02-7woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in msg() (CAN-2004-0393)
  * Fix buffer overflow vulnerability in msg() (CAN-2004-0454)


stable/main/binary-arm/rlpr_2.02-7woody1_arm.deb
rlpr (2.02-7woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in msg() (CAN-2004-0393)
  * Fix buffer overflow vulnerability in msg() (CAN-2004-0454)


stable/main/binary-alpha/rlpr_2.02-7woody1_alpha.deb
rlpr (2.02-7woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in msg() (CAN-2004-0393)
  * Fix buffer overflow vulnerability in msg() (CAN-2004-0454)


stable/main/source/rlpr_2.02-7woody1.dsc
stable/main/source/rlpr_2.02-7woody1.diff.gz
stable/main/binary-i386/rlpr_2.02-7woody1_i386.deb
rlpr (2.02-7woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in msg() (CAN-2004-0393)
  * Fix buffer overflow vulnerability in msg() (CAN-2004-0454)


stable/main/binary-sparc/postgresql-contrib_7.2.1-2woody6_sparc.deb
stable/main/binary-sparc/libpgsql2_7.2.1-2woody6_sparc.deb
stable/main/binary-sparc/python-pygresql_7.2.1-2woody6_sparc.deb
stable/main/binary-sparc/postgresql-client_7.2.1-2woody6_sparc.deb
stable/main/binary-sparc/odbc-postgresql_7.2.1-2woody6_sparc.deb
stable/main/binary-sparc/libecpg3_7.2.1-2woody6_sparc.deb
stable/main/binary-sparc/postgresql-dev_7.2.1-2woody6_sparc.deb
stable/main/binary-sparc/libpgtcl_7.2.1-2woody6_sparc.deb
stable/main/binary-sparc/libpgperl_7.2.1-2woody6_sparc.deb
stable/main/binary-sparc/postgresql_7.2.1-2woody6_sparc.deb
stable/main/binary-sparc/pgaccess_7.2.1-2woody6_sparc.deb
postgresql (7.2.1-2woody6) stable-security; urgency=high
  * Security upload to fix insecure temporary file handling in
    contrib/findoidjoins/make_oidjoins_check:
    - use version from upstream release 7.2.6 as basis (introduces proper
      variables for the file names instead of repeatedly constructing them
      inline)
    - upstream still uses the $$ method for constructing file names; changed
      that to use mktemp
  * References:
    CAN-2004-0977
    http://www.postgresql.org/news/234.html
    http://bugs.debian.org/278336


stable/main/binary-s390/libpgtcl_7.2.1-2woody6_s390.deb
stable/main/binary-s390/postgresql_7.2.1-2woody6_s390.deb
stable/main/binary-s390/libpgperl_7.2.1-2woody6_s390.deb
stable/main/binary-s390/postgresql-dev_7.2.1-2woody6_s390.deb
stable/main/binary-s390/python-pygresql_7.2.1-2woody6_s390.deb
stable/main/binary-s390/pgaccess_7.2.1-2woody6_s390.deb
stable/main/binary-s390/libpgsql2_7.2.1-2woody6_s390.deb
stable/main/binary-s390/odbc-postgresql_7.2.1-2woody6_s390.deb
stable/main/binary-s390/libecpg3_7.2.1-2woody6_s390.deb
stable/main/binary-s390/postgresql-client_7.2.1-2woody6_s390.deb
stable/main/binary-s390/postgresql-contrib_7.2.1-2woody6_s390.deb
postgresql (7.2.1-2woody6) stable-security; urgency=high
  * Security upload to fix insecure temporary file handling in
    contrib/findoidjoins/make_oidjoins_check:
    - use version from upstream release 7.2.6 as basis (introduces proper
      variables for the file names instead of repeatedly constructing them
      inline)
    - upstream still uses the $$ method for constructing file names; changed
      that to use mktemp
  * References:
    CAN-2004-0977
    http://www.postgresql.org/news/234.html
    http://bugs.debian.org/278336


stable/main/binary-powerpc/postgresql_7.2.1-2woody6_powerpc.deb
stable/main/binary-powerpc/libecpg3_7.2.1-2woody6_powerpc.deb
stable/main/binary-powerpc/libpgtcl_7.2.1-2woody6_powerpc.deb
stable/main/binary-powerpc/pgaccess_7.2.1-2woody6_powerpc.deb
stable/main/binary-powerpc/postgresql-dev_7.2.1-2woody6_powerpc.deb
stable/main/binary-powerpc/python-pygresql_7.2.1-2woody6_powerpc.deb
stable/main/binary-powerpc/libpgperl_7.2.1-2woody6_powerpc.deb
stable/main/binary-powerpc/postgresql-client_7.2.1-2woody6_powerpc.deb
stable/main/binary-powerpc/libpgsql2_7.2.1-2woody6_powerpc.deb
stable/main/binary-powerpc/odbc-postgresql_7.2.1-2woody6_powerpc.deb
stable/main/binary-powerpc/postgresql-contrib_7.2.1-2woody6_powerpc.deb
postgresql (7.2.1-2woody6) stable-security; urgency=high
  * Security upload to fix insecure temporary file handling in
    contrib/findoidjoins/make_oidjoins_check:
    - use version from upstream release 7.2.6 as basis (introduces proper
      variables for the file names instead of repeatedly constructing them
      inline)
    - upstream still uses the $$ method for constructing file names; changed
      that to use mktemp
  * References:
    CAN-2004-0977
    http://www.postgresql.org/news/234.html
    http://bugs.debian.org/278336


stable/main/binary-mipsel/libpgsql2_7.2.1-2woody6_mipsel.deb
stable/main/binary-mipsel/odbc-postgresql_7.2.1-2woody6_mipsel.deb
stable/main/binary-mipsel/pgaccess_7.2.1-2woody6_mipsel.deb
stable/main/binary-mipsel/libecpg3_7.2.1-2woody6_mipsel.deb
stable/main/binary-mipsel/postgresql-dev_7.2.1-2woody6_mipsel.deb
stable/main/binary-mipsel/postgresql_7.2.1-2woody6_mipsel.deb
stable/main/binary-mipsel/postgresql-contrib_7.2.1-2woody6_mipsel.deb
stable/main/binary-mipsel/libpgtcl_7.2.1-2woody6_mipsel.deb
stable/main/binary-mipsel/postgresql-client_7.2.1-2woody6_mipsel.deb
stable/main/binary-mipsel/python-pygresql_7.2.1-2woody6_mipsel.deb
stable/main/binary-mipsel/libpgperl_7.2.1-2woody6_mipsel.deb
postgresql (7.2.1-2woody6) stable-security; urgency=high
  * Security upload to fix insecure temporary file handling in
    contrib/findoidjoins/make_oidjoins_check:
    - use version from upstream release 7.2.6 as basis (introduces proper
      variables for the file names instead of repeatedly constructing them
      inline)
    - upstream still uses the $$ method for constructing file names; changed
      that to use mktemp
  * References:
    CAN-2004-0977
    http://www.postgresql.org/news/234.html
    http://bugs.debian.org/278336


stable/main/binary-mips/python-pygresql_7.2.1-2woody6_mips.deb
stable/main/binary-mips/libpgperl_7.2.1-2woody6_mips.deb
stable/main/binary-mips/pgaccess_7.2.1-2woody6_mips.deb
stable/main/binary-mips/libpgsql2_7.2.1-2woody6_mips.deb
stable/main/binary-mips/postgresql-dev_7.2.1-2woody6_mips.deb
stable/main/binary-mips/libpgtcl_7.2.1-2woody6_mips.deb
stable/main/binary-mips/postgresql_7.2.1-2woody6_mips.deb
stable/main/binary-mips/libecpg3_7.2.1-2woody6_mips.deb
stable/main/binary-mips/postgresql-contrib_7.2.1-2woody6_mips.deb
stable/main/binary-mips/postgresql-client_7.2.1-2woody6_mips.deb
stable/main/binary-mips/odbc-postgresql_7.2.1-2woody6_mips.deb
postgresql (7.2.1-2woody6) stable-security; urgency=high
  * Security upload to fix insecure temporary file handling in
    contrib/findoidjoins/make_oidjoins_check:
    - use version from upstream release 7.2.6 as basis (introduces proper
      variables for the file names instead of repeatedly constructing them
      inline)
    - upstream still uses the $$ method for constructing file names; changed
      that to use mktemp
  * References:
    CAN-2004-0977
    http://www.postgresql.org/news/234.html
    http://bugs.debian.org/278336


stable/main/binary-m68k/python-pygresql_7.2.1-2woody6_m68k.deb
stable/main/binary-m68k/postgresql-contrib_7.2.1-2woody6_m68k.deb
stable/main/binary-m68k/pgaccess_7.2.1-2woody6_m68k.deb
stable/main/binary-m68k/libecpg3_7.2.1-2woody6_m68k.deb
stable/main/binary-m68k/libpgperl_7.2.1-2woody6_m68k.deb
stable/main/binary-m68k/postgresql-client_7.2.1-2woody6_m68k.deb
stable/main/binary-m68k/postgresql-dev_7.2.1-2woody6_m68k.deb
stable/main/binary-m68k/odbc-postgresql_7.2.1-2woody6_m68k.deb
stable/main/binary-m68k/libpgtcl_7.2.1-2woody6_m68k.deb
stable/main/binary-m68k/libpgsql2_7.2.1-2woody6_m68k.deb
stable/main/binary-m68k/postgresql_7.2.1-2woody6_m68k.deb
postgresql (7.2.1-2woody6) stable-security; urgency=high
  * Security upload to fix insecure temporary file handling in
    contrib/findoidjoins/make_oidjoins_check:
    - use version from upstream release 7.2.6 as basis (introduces proper
      variables for the file names instead of repeatedly constructing them
      inline)
    - upstream still uses the $$ method for constructing file names; changed
      that to use mktemp
  * References:
    CAN-2004-0977
    http://www.postgresql.org/news/234.html
    http://bugs.debian.org/278336


stable/main/binary-ia64/postgresql_7.2.1-2woody6_ia64.deb
stable/main/binary-ia64/libpgtcl_7.2.1-2woody6_ia64.deb
stable/main/binary-ia64/python-pygresql_7.2.1-2woody6_ia64.deb
stable/main/binary-ia64/odbc-postgresql_7.2.1-2woody6_ia64.deb
stable/main/binary-ia64/pgaccess_7.2.1-2woody6_ia64.deb
stable/main/binary-ia64/postgresql-client_7.2.1-2woody6_ia64.deb
stable/main/binary-ia64/libpgperl_7.2.1-2woody6_ia64.deb
stable/main/binary-ia64/libecpg3_7.2.1-2woody6_ia64.deb
stable/main/binary-ia64/postgresql-contrib_7.2.1-2woody6_ia64.deb
stable/main/binary-ia64/postgresql-dev_7.2.1-2woody6_ia64.deb
stable/main/binary-ia64/libpgsql2_7.2.1-2woody6_ia64.deb
postgresql (7.2.1-2woody6) stable-security; urgency=high
  * Security upload to fix insecure temporary file handling in
    contrib/findoidjoins/make_oidjoins_check:
    - use version from upstream release 7.2.6 as basis (introduces proper
      variables for the file names instead of repeatedly constructing them
      inline)
    - upstream still uses the $$ method for constructing file names; changed
      that to use mktemp
  * References:
    CAN-2004-0977
    http://www.postgresql.org/news/234.html
    http://bugs.debian.org/278336


stable/main/binary-hppa/postgresql-contrib_7.2.1-2woody6_hppa.deb
stable/main/binary-hppa/pgaccess_7.2.1-2woody6_hppa.deb
stable/main/binary-hppa/libecpg3_7.2.1-2woody6_hppa.deb
stable/main/binary-hppa/postgresql-dev_7.2.1-2woody6_hppa.deb
stable/main/binary-hppa/postgresql_7.2.1-2woody6_hppa.deb
stable/main/binary-hppa/libpgperl_7.2.1-2woody6_hppa.deb
stable/main/binary-hppa/postgresql-client_7.2.1-2woody6_hppa.deb
stable/main/binary-hppa/libpgsql2_7.2.1-2woody6_hppa.deb
stable/main/binary-hppa/python-pygresql_7.2.1-2woody6_hppa.deb
stable/main/binary-hppa/libpgtcl_7.2.1-2woody6_hppa.deb
stable/main/binary-hppa/odbc-postgresql_7.2.1-2woody6_hppa.deb
postgresql (7.2.1-2woody6) stable-security; urgency=high
  * Security upload to fix insecure temporary file handling in
    contrib/findoidjoins/make_oidjoins_check:
    - use version from upstream release 7.2.6 as basis (introduces proper
      variables for the file names instead of repeatedly constructing them
      inline)
    - upstream still uses the $$ method for constructing file names; changed
      that to use mktemp
  * References:
    CAN-2004-0977
    http://www.postgresql.org/news/234.html
    http://bugs.debian.org/278336


stable/main/binary-arm/postgresql-dev_7.2.1-2woody6_arm.deb
stable/main/binary-arm/libpgperl_7.2.1-2woody6_arm.deb
stable/main/binary-arm/python-pygresql_7.2.1-2woody6_arm.deb
stable/main/binary-arm/pgaccess_7.2.1-2woody6_arm.deb
stable/main/binary-arm/postgresql_7.2.1-2woody6_arm.deb
stable/main/binary-arm/libecpg3_7.2.1-2woody6_arm.deb
stable/main/binary-arm/postgresql-client_7.2.1-2woody6_arm.deb
stable/main/binary-arm/postgresql-contrib_7.2.1-2woody6_arm.deb
stable/main/binary-arm/libpgtcl_7.2.1-2woody6_arm.deb
stable/main/binary-arm/libpgsql2_7.2.1-2woody6_arm.deb
stable/main/binary-arm/odbc-postgresql_7.2.1-2woody6_arm.deb
postgresql (7.2.1-2woody6) stable-security; urgency=high
  * Security upload to fix insecure temporary file handling in
    contrib/findoidjoins/make_oidjoins_check:
    - use version from upstream release 7.2.6 as basis (introduces proper
      variables for the file names instead of repeatedly constructing them
      inline)
    - upstream still uses the $$ method for constructing file names; changed
      that to use mktemp
  * References:
    CAN-2004-0977
    http://www.postgresql.org/news/234.html
    http://bugs.debian.org/278336


stable/main/binary-alpha/postgresql-contrib_7.2.1-2woody6_alpha.deb
stable/main/binary-alpha/python-pygresql_7.2.1-2woody6_alpha.deb
stable/main/binary-alpha/postgresql-dev_7.2.1-2woody6_alpha.deb
stable/main/binary-alpha/libpgperl_7.2.1-2woody6_alpha.deb
stable/main/binary-alpha/postgresql-client_7.2.1-2woody6_alpha.deb
stable/main/binary-alpha/libecpg3_7.2.1-2woody6_alpha.deb
stable/main/binary-alpha/pgaccess_7.2.1-2woody6_alpha.deb
stable/main/binary-alpha/odbc-postgresql_7.2.1-2woody6_alpha.deb
stable/main/binary-alpha/libpgsql2_7.2.1-2woody6_alpha.deb
stable/main/binary-alpha/postgresql_7.2.1-2woody6_alpha.deb
stable/main/binary-alpha/libpgtcl_7.2.1-2woody6_alpha.deb
postgresql (7.2.1-2woody6) stable-security; urgency=high
  * Security upload to fix insecure temporary file handling in
    contrib/findoidjoins/make_oidjoins_check:
    - use version from upstream release 7.2.6 as basis (introduces proper
      variables for the file names instead of repeatedly constructing them
      inline)
    - upstream still uses the $$ method for constructing file names; changed
      that to use mktemp
  * References:
    CAN-2004-0977
    http://www.postgresql.org/news/234.html
    http://bugs.debian.org/278336


stable/main/binary-i386/postgresql_7.2.1-2woody6_i386.deb
stable/main/binary-i386/libpgsql2_7.2.1-2woody6_i386.deb
stable/main/source/postgresql_7.2.1-2woody6.dsc
stable/main/binary-i386/odbc-postgresql_7.2.1-2woody6_i386.deb
stable/main/binary-i386/postgresql-client_7.2.1-2woody6_i386.deb
stable/main/binary-i386/postgresql-dev_7.2.1-2woody6_i386.deb
stable/main/binary-i386/pgaccess_7.2.1-2woody6_i386.deb
stable/main/binary-i386/libecpg3_7.2.1-2woody6_i386.deb
stable/main/binary-i386/postgresql-contrib_7.2.1-2woody6_i386.deb
stable/main/binary-all/postgresql-doc_7.2.1-2woody6_all.deb
stable/main/source/postgresql_7.2.1-2woody6.diff.gz
stable/main/binary-i386/libpgperl_7.2.1-2woody6_i386.deb
stable/main/binary-i386/libpgtcl_7.2.1-2woody6_i386.deb
stable/main/binary-i386/python-pygresql_7.2.1-2woody6_i386.deb
postgresql (7.2.1-2woody6) stable-security; urgency=high
  * Security upload to fix insecure temporary file handling in
    contrib/findoidjoins/make_oidjoins_check:
    - use version from upstream release 7.2.6 as basis (introduces proper
      variables for the file names instead of repeatedly constructing them
      inline)
    - upstream still uses the $$ method for constructing file names; changed
      that to use mktemp
  * References:
    CAN-2004-0977
    http://www.postgresql.org/news/234.html
    http://bugs.debian.org/278336


stable/main/binary-sparc/openssl_0.9.6c-2.woody.7_sparc.deb
stable/main/binary-sparc/libssl-dev_0.9.6c-2.woody.7_sparc.deb
stable/main/binary-sparc/libssl0.9.6_0.9.6c-2.woody.7_sparc.deb
openssl (0.9.6c-2.woody.7) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Applied patch by Martin Pitt to fix insecure temporary file creation
    by replacing $$-style creation of temporary files with
    File::Temp::tempfile() [apps/der_chop, CAN-2004-0975]


stable/main/binary-s390/libssl-dev_0.9.6c-2.woody.7_s390.deb
stable/main/binary-s390/openssl_0.9.6c-2.woody.7_s390.deb
stable/main/binary-s390/libssl0.9.6_0.9.6c-2.woody.7_s390.deb
openssl (0.9.6c-2.woody.7) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Applied patch by Martin Pitt to fix insecure temporary file creation
    by replacing $$-style creation of temporary files with
    File::Temp::tempfile() [apps/der_chop, CAN-2004-0975]


stable/main/binary-powerpc/libssl0.9.6_0.9.6c-2.woody.7_powerpc.deb
stable/main/binary-powerpc/libssl-dev_0.9.6c-2.woody.7_powerpc.deb
stable/main/binary-powerpc/openssl_0.9.6c-2.woody.7_powerpc.deb
openssl (0.9.6c-2.woody.7) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Applied patch by Martin Pitt to fix insecure temporary file creation
    by replacing $$-style creation of temporary files with
    File::Temp::tempfile() [apps/der_chop, CAN-2004-0975]


stable/main/binary-mips/libssl0.9.6_0.9.6c-2.woody.7_mips.deb
stable/main/binary-mips/libssl-dev_0.9.6c-2.woody.7_mips.deb
stable/main/binary-mips/openssl_0.9.6c-2.woody.7_mips.deb
openssl (0.9.6c-2.woody.7) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Applied patch by Martin Pitt to fix insecure temporary file creation
    by replacing $$-style creation of temporary files with
    File::Temp::tempfile() [apps/der_chop, CAN-2004-0975]


stable/main/binary-m68k/libssl0.9.6_0.9.6c-2.woody.7_m68k.deb
stable/main/binary-m68k/openssl_0.9.6c-2.woody.7_m68k.deb
stable/main/binary-m68k/libssl-dev_0.9.6c-2.woody.7_m68k.deb
openssl (0.9.6c-2.woody.7) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Applied patch by Martin Pitt to fix insecure temporary file creation
    by replacing $$-style creation of temporary files with
    File::Temp::tempfile() [apps/der_chop, CAN-2004-0975]


stable/main/binary-ia64/libssl-dev_0.9.6c-2.woody.7_ia64.deb
stable/main/binary-ia64/libssl0.9.6_0.9.6c-2.woody.7_ia64.deb
stable/main/binary-ia64/openssl_0.9.6c-2.woody.7_ia64.deb
openssl (0.9.6c-2.woody.7) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Applied patch by Martin Pitt to fix insecure temporary file creation
    by replacing $$-style creation of temporary files with
    File::Temp::tempfile() [apps/der_chop, CAN-2004-0975]


stable/main/binary-i386/openssl_0.9.6c-2.woody.7_i386.deb
stable/main/binary-i386/libssl0.9.6_0.9.6c-2.woody.7_i386.deb
stable/main/binary-i386/libssl-dev_0.9.6c-2.woody.7_i386.deb
openssl (0.9.6c-2.woody.7) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Applied patch by Martin Pitt to fix insecure temporary file creation
    by replacing $$-style creation of temporary files with
    File::Temp::tempfile() [apps/der_chop, CAN-2004-0975]


stable/main/binary-hppa/openssl_0.9.6c-2.woody.7_hppa.deb
stable/main/binary-hppa/libssl0.9.6_0.9.6c-2.woody.7_hppa.deb
stable/main/binary-hppa/libssl-dev_0.9.6c-2.woody.7_hppa.deb
openssl (0.9.6c-2.woody.7) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Applied patch by Martin Pitt to fix insecure temporary file creation
    by replacing $$-style creation of temporary files with
    File::Temp::tempfile() [apps/der_chop, CAN-2004-0975]


stable/main/binary-arm/libssl-dev_0.9.6c-2.woody.7_arm.deb
stable/main/binary-arm/libssl0.9.6_0.9.6c-2.woody.7_arm.deb
stable/main/binary-arm/openssl_0.9.6c-2.woody.7_arm.deb
openssl (0.9.6c-2.woody.7) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Applied patch by Martin Pitt to fix insecure temporary file creation
    by replacing $$-style creation of temporary files with
    File::Temp::tempfile() [apps/der_chop, CAN-2004-0975]


stable/main/binary-alpha/libssl0.9.6_0.9.6c-2.woody.7_alpha.deb
stable/main/binary-alpha/openssl_0.9.6c-2.woody.7_alpha.deb
stable/main/binary-alpha/libssl-dev_0.9.6c-2.woody.7_alpha.deb
openssl (0.9.6c-2.woody.7) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Applied patch by Martin Pitt to fix insecure temporary file creation
    by replacing $$-style creation of temporary files with
    File::Temp::tempfile() [apps/der_chop, CAN-2004-0975]


stable/main/binary-mipsel/libssl-dev_0.9.6c-2.woody.7_mipsel.deb
stable/main/binary-all/ssleay_0.9.6c-2.woody.7_all.deb
stable/main/source/openssl_0.9.6c-2.woody.7.dsc
stable/main/source/openssl_0.9.6c-2.woody.7.diff.gz
stable/main/binary-mipsel/openssl_0.9.6c-2.woody.7_mipsel.deb
stable/main/binary-mipsel/libssl0.9.6_0.9.6c-2.woody.7_mipsel.deb
openssl (0.9.6c-2.woody.7) stable-security; urgency=high
  * Non-Maintainer upload by the Security Team
  * Applied patch by Martin Pitt to fix insecure temporary file creation
    by replacing $$-style creation of temporary files with
    File::Temp::tempfile() [apps/der_chop, CAN-2004-0975]


stable/main/binary-sparc/oftpd_0.3.6-6_sparc.deb
oftpd (0.3.6-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376)


stable/main/binary-s390/oftpd_0.3.6-6_s390.deb
oftpd (0.3.6-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376)


stable/main/binary-powerpc/oftpd_0.3.6-6_powerpc.deb
oftpd (0.3.6-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376)


stable/main/binary-mipsel/oftpd_0.3.6-6_mipsel.deb
oftpd (0.3.6-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376)


stable/main/binary-mips/oftpd_0.3.6-6_mips.deb
oftpd (0.3.6-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376)


stable/main/binary-m68k/oftpd_0.3.6-6_m68k.deb
oftpd (0.3.6-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376)


stable/main/binary-ia64/oftpd_0.3.6-6_ia64.deb
oftpd (0.3.6-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376)


stable/main/binary-hppa/oftpd_0.3.6-6_hppa.deb
oftpd (0.3.6-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376)


stable/main/binary-arm/oftpd_0.3.6-6_arm.deb
oftpd (0.3.6-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376)


stable/main/binary-alpha/oftpd_0.3.6-6_alpha.deb
oftpd (0.3.6-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376)


stable/main/source/oftpd_0.3.6-6.diff.gz
stable/main/source/oftpd_0.3.6-6.dsc
stable/main/binary-i386/oftpd_0.3.6-6_i386.deb
oftpd (0.3.6-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from oftpd 0.3.7 to fix denial of service (CAN-2004-0376)


stable/main/binary-sparc/nhfsstone_1.0-2woody3_sparc.deb
stable/main/binary-sparc/nfs-kernel-server_1.0-2woody3_sparc.deb
stable/main/binary-sparc/nfs-common_1.0-2woody3_sparc.deb
nfs-utils (1:1.0-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by SGI to fix DoS [utils/statd/statd.c,
    CAN-2004-1014]
  * Bumped up the version number to nullify that fixed a problem in unused
    code


stable/main/binary-s390/nfs-common_1.0-2woody3_s390.deb
stable/main/binary-s390/nhfsstone_1.0-2woody3_s390.deb
stable/main/binary-s390/nfs-kernel-server_1.0-2woody3_s390.deb
nfs-utils (1:1.0-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by SGI to fix DoS [utils/statd/statd.c,
    CAN-2004-1014]
  * Bumped up the version number to nullify that fixed a problem in unused
    code


stable/main/binary-powerpc/nfs-kernel-server_1.0-2woody3_powerpc.deb
stable/main/binary-powerpc/nfs-common_1.0-2woody3_powerpc.deb
stable/main/binary-powerpc/nhfsstone_1.0-2woody3_powerpc.deb
nfs-utils (1:1.0-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by SGI to fix DoS [utils/statd/statd.c,
    CAN-2004-1014]
  * Bumped up the version number to nullify that fixed a problem in unused
    code


stable/main/binary-mips/nhfsstone_1.0-2woody3_mips.deb
stable/main/binary-mips/nfs-kernel-server_1.0-2woody3_mips.deb
stable/main/binary-mips/nfs-common_1.0-2woody3_mips.deb
nfs-utils (1:1.0-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by SGI to fix DoS [utils/statd/statd.c,
    CAN-2004-1014]
  * Bumped up the version number to nullify that fixed a problem in unused
    code


stable/main/binary-m68k/nfs-kernel-server_1.0-2woody3_m68k.deb
stable/main/binary-m68k/nhfsstone_1.0-2woody3_m68k.deb
stable/main/binary-m68k/nfs-common_1.0-2woody3_m68k.deb
nfs-utils (1:1.0-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by SGI to fix DoS [utils/statd/statd.c,
    CAN-2004-1014]
  * Bumped up the version number to nullify that fixed a problem in unused
    code


stable/main/binary-ia64/nfs-kernel-server_1.0-2woody3_ia64.deb
stable/main/binary-ia64/nfs-common_1.0-2woody3_ia64.deb
stable/main/binary-ia64/nhfsstone_1.0-2woody3_ia64.deb
nfs-utils (1:1.0-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by SGI to fix DoS [utils/statd/statd.c,
    CAN-2004-1014]
  * Bumped up the version number to nullify that fixed a problem in unused
    code


stable/main/binary-i386/nfs-common_1.0-2woody3_i386.deb
stable/main/binary-i386/nfs-kernel-server_1.0-2woody3_i386.deb
stable/main/binary-i386/nhfsstone_1.0-2woody3_i386.deb
nfs-utils (1:1.0-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by SGI to fix DoS [utils/statd/statd.c,
    CAN-2004-1014]
  * Bumped up the version number to nullify that fixed a problem in unused
    code


stable/main/binary-hppa/nhfsstone_1.0-2woody3_hppa.deb
stable/main/binary-hppa/nfs-common_1.0-2woody3_hppa.deb
stable/main/binary-hppa/nfs-kernel-server_1.0-2woody3_hppa.deb
nfs-utils (1:1.0-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by SGI to fix DoS [utils/statd/statd.c,
    CAN-2004-1014]
  * Bumped up the version number to nullify that fixed a problem in unused
    code


stable/main/binary-arm/nhfsstone_1.0-2woody3_arm.deb
stable/main/binary-arm/nfs-common_1.0-2woody3_arm.deb
stable/main/binary-arm/nfs-kernel-server_1.0-2woody3_arm.deb
nfs-utils (1:1.0-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by SGI to fix DoS [utils/statd/statd.c,
    CAN-2004-1014]
  * Bumped up the version number to nullify that fixed a problem in unused
    code


stable/main/binary-alpha/nhfsstone_1.0-2woody3_alpha.deb
stable/main/binary-alpha/nfs-common_1.0-2woody3_alpha.deb
stable/main/binary-alpha/nfs-kernel-server_1.0-2woody3_alpha.deb
nfs-utils (1:1.0-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by SGI to fix DoS [utils/statd/statd.c,
    CAN-2004-1014]
  * Bumped up the version number to nullify that fixed a problem in unused
    code


stable/main/source/nfs-utils_1.0-2woody3.dsc
stable/main/binary-mipsel/nhfsstone_1.0-2woody3_mipsel.deb
stable/main/binary-mipsel/nfs-common_1.0-2woody3_mipsel.deb
stable/main/source/nfs-utils_1.0-2woody3.tar.gz
stable/main/binary-mipsel/nfs-kernel-server_1.0-2woody3_mipsel.deb
nfs-utils (1:1.0-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch by SGI to fix DoS [utils/statd/statd.c,
    CAN-2004-1014]
  * Bumped up the version number to nullify that fixed a problem in unused
    code


stable/main/binary-sparc/netpbm_9.20-8.4_sparc.deb
stable/main/binary-sparc/libnetpbm9_9.20-8.4_sparc.deb
stable/main/binary-sparc/libnetpbm9-dev_9.20-8.4_sparc.deb
netpbm-free (2:9.20-8.4) stable-security; urgency=high
  * Maintainer upload, uploaded by the Security Team
  * Fixed more tmpfile-problems, see also Bug #219019


stable/main/binary-s390/libnetpbm9-dev_9.20-8.4_s390.deb
stable/main/binary-s390/netpbm_9.20-8.4_s390.deb
stable/main/binary-s390/libnetpbm9_9.20-8.4_s390.deb
netpbm-free (2:9.20-8.4) stable-security; urgency=high
  * Maintainer upload, uploaded by the Security Team
  * Fixed more tmpfile-problems, see also Bug #219019


stable/main/binary-powerpc/netpbm_9.20-8.4_powerpc.deb
stable/main/binary-powerpc/libnetpbm9_9.20-8.4_powerpc.deb
stable/main/binary-powerpc/libnetpbm9-dev_9.20-8.4_powerpc.deb
netpbm-free (2:9.20-8.4) stable-security; urgency=high
  * Maintainer upload, uploaded by the Security Team
  * Fixed more tmpfile-problems, see also Bug #219019


stable/main/binary-mipsel/libnetpbm9-dev_9.20-8.4_mipsel.deb
stable/main/binary-mipsel/netpbm_9.20-8.4_mipsel.deb
stable/main/binary-mipsel/libnetpbm9_9.20-8.4_mipsel.deb
netpbm-free (2:9.20-8.4) stable-security; urgency=high
  * Maintainer upload, uploaded by the Security Team
  * Fixed more tmpfile-problems, see also Bug #219019


stable/main/binary-mips/libnetpbm9-dev_9.20-8.4_mips.deb
stable/main/binary-mips/libnetpbm9_9.20-8.4_mips.deb
stable/main/binary-mips/netpbm_9.20-8.4_mips.deb
netpbm-free (2:9.20-8.4) stable-security; urgency=high
  * Maintainer upload, uploaded by the Security Team
  * Fixed more tmpfile-problems, see also Bug #219019


stable/main/binary-m68k/libnetpbm9_9.20-8.4_m68k.deb
stable/main/binary-m68k/libnetpbm9-dev_9.20-8.4_m68k.deb
stable/main/binary-m68k/netpbm_9.20-8.4_m68k.deb
netpbm-free (2:9.20-8.4) stable-security; urgency=high
  * Maintainer upload, uploaded by the Security Team
  * Fixed more tmpfile-problems, see also Bug #219019


stable/main/binary-ia64/libnetpbm9-dev_9.20-8.4_ia64.deb
stable/main/binary-ia64/libnetpbm9_9.20-8.4_ia64.deb
stable/main/binary-ia64/netpbm_9.20-8.4_ia64.deb
netpbm-free (2:9.20-8.4) stable-security; urgency=high
  * Maintainer upload, uploaded by the Security Team
  * Fixed more tmpfile-problems, see also Bug #219019


stable/main/binary-hppa/netpbm_9.20-8.4_hppa.deb
stable/main/binary-hppa/libnetpbm9_9.20-8.4_hppa.deb
stable/main/binary-hppa/libnetpbm9-dev_9.20-8.4_hppa.deb
netpbm-free (2:9.20-8.4) stable-security; urgency=high
  * Maintainer upload, uploaded by the Security Team
  * Fixed more tmpfile-problems, see also Bug #219019


stable/main/binary-arm/libnetpbm9-dev_9.20-8.4_arm.deb
stable/main/binary-arm/libnetpbm9_9.20-8.4_arm.deb
stable/main/binary-arm/netpbm_9.20-8.4_arm.deb
netpbm-free (2:9.20-8.4) stable-security; urgency=high
  * Maintainer upload, uploaded by the Security Team
  * Fixed more tmpfile-problems, see also Bug #219019


stable/main/binary-alpha/libnetpbm9-dev_9.20-8.4_alpha.deb
stable/main/binary-alpha/libnetpbm9_9.20-8.4_alpha.deb
stable/main/binary-alpha/netpbm_9.20-8.4_alpha.deb
netpbm-free (2:9.20-8.4) stable-security; urgency=high
  * Maintainer upload, uploaded by the Security Team
  * Fixed more tmpfile-problems, see also Bug #219019


stable/main/source/netpbm-free_9.20-8.4.diff.gz
stable/main/binary-i386/netpbm_9.20-8.4_i386.deb
stable/main/binary-i386/libnetpbm9_9.20-8.4_i386.deb
stable/main/binary-i386/libnetpbm9-dev_9.20-8.4_i386.deb
stable/main/source/netpbm-free_9.20-8.4.dsc
netpbm-free (2:9.20-8.4) stable-security; urgency=high
  * Maintainer upload, uploaded by the Security Team
  * Fixed more tmpfile-problems, see also Bug #219019


stable/main/binary-sparc/telnet-ssl_0.17.17+0.1-2woody3_sparc.deb
stable/main/binary-sparc/telnetd-ssl_0.17.17+0.1-2woody3_sparc.deb
netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed format string vulnerability discovered by Joel Eriksson
    [telnetd/telnetd.c, CAN-2004-0998]


stable/main/binary-s390/telnet-ssl_0.17.17+0.1-2woody3_s390.deb
stable/main/binary-s390/telnetd-ssl_0.17.17+0.1-2woody3_s390.deb
netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed format string vulnerability discovered by Joel Eriksson
    [telnetd/telnetd.c, CAN-2004-0998]


stable/main/binary-powerpc/telnetd-ssl_0.17.17+0.1-2woody3_powerpc.deb
stable/main/binary-powerpc/telnet-ssl_0.17.17+0.1-2woody3_powerpc.deb
netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed format string vulnerability discovered by Joel Eriksson
    [telnetd/telnetd.c, CAN-2004-0998]


stable/main/binary-mips/telnet-ssl_0.17.17+0.1-2woody3_mips.deb
stable/main/binary-mips/telnetd-ssl_0.17.17+0.1-2woody3_mips.deb
netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed format string vulnerability discovered by Joel Eriksson
    [telnetd/telnetd.c, CAN-2004-0998]


stable/main/binary-m68k/telnetd-ssl_0.17.17+0.1-2woody3_m68k.deb
stable/main/binary-m68k/telnet-ssl_0.17.17+0.1-2woody3_m68k.deb
netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed format string vulnerability discovered by Joel Eriksson
    [telnetd/telnetd.c, CAN-2004-0998]


stable/main/binary-ia64/telnet-ssl_0.17.17+0.1-2woody3_ia64.deb
stable/main/binary-ia64/telnetd-ssl_0.17.17+0.1-2woody3_ia64.deb
netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed format string vulnerability discovered by Joel Eriksson
    [telnetd/telnetd.c, CAN-2004-0998]


stable/main/binary-i386/telnetd-ssl_0.17.17+0.1-2woody3_i386.deb
stable/main/binary-i386/telnet-ssl_0.17.17+0.1-2woody3_i386.deb
netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed format string vulnerability discovered by Joel Eriksson
    [telnetd/telnetd.c, CAN-2004-0998]


stable/main/binary-hppa/telnet-ssl_0.17.17+0.1-2woody3_hppa.deb
stable/main/binary-hppa/telnetd-ssl_0.17.17+0.1-2woody3_hppa.deb
netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed format string vulnerability discovered by Joel Eriksson
    [telnetd/telnetd.c, CAN-2004-0998]


stable/main/binary-arm/telnetd-ssl_0.17.17+0.1-2woody3_arm.deb
stable/main/binary-arm/telnet-ssl_0.17.17+0.1-2woody3_arm.deb
netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed format string vulnerability discovered by Joel Eriksson
    [telnetd/telnetd.c, CAN-2004-0998]


stable/main/binary-alpha/telnetd-ssl_0.17.17+0.1-2woody3_alpha.deb
stable/main/binary-alpha/telnet-ssl_0.17.17+0.1-2woody3_alpha.deb
netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed format string vulnerability discovered by Joel Eriksson
    [telnetd/telnetd.c, CAN-2004-0998]


stable/main/binary-mipsel/telnet-ssl_0.17.17+0.1-2woody3_mipsel.deb
stable/main/source/netkit-telnet-ssl_0.17.17+0.1-2woody3.diff.gz
stable/main/source/netkit-telnet-ssl_0.17.17+0.1-2woody3.dsc
stable/main/binary-mipsel/telnetd-ssl_0.17.17+0.1-2woody3_mipsel.deb
netkit-telnet-ssl (0.17.17+0.1-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed format string vulnerability discovered by Joel Eriksson
    [telnetd/telnetd.c, CAN-2004-0998]


stable/non-free/binary-i386/mpg123-esd_0.59r-13woody4_i386.deb
stable/non-free/binary-arm/mpg123_0.59r-13woody4_arm.deb
stable/non-free/binary-powerpc/mpg123-esd_0.59r-13woody4_powerpc.deb
stable/non-free/binary-alpha/mpg123-esd_0.59r-13woody4_alpha.deb
stable/non-free/binary-i386/mpg123_0.59r-13woody4_i386.deb
stable/non-free/binary-powerpc/mpg123_0.59r-13woody4_powerpc.deb
stable/non-free/binary-sparc/mpg123_0.59r-13woody4_sparc.deb
stable/non-free/binary-i386/mpg123-nas_0.59r-13woody4_i386.deb
stable/non-free/binary-i386/mpg123-oss-3dnow_0.59r-13woody4_i386.deb
stable/non-free/binary-m68k/mpg123_0.59r-13woody4_m68k.deb
stable/non-free/binary-hppa/mpg123_0.59r-13woody4_hppa.deb
stable/non-free/source/mpg123_0.59r-13woody4.diff.gz
stable/non-free/source/mpg123_0.59r-13woody4.dsc
stable/non-free/binary-i386/mpg123-oss-i486_0.59r-13woody4_i386.deb
stable/non-free/binary-alpha/mpg123_0.59r-13woody4_alpha.deb
mpg123 (0.59r-13woody4) stable-security; urgency=high
  * httpget.c: Fix yet another heap overflow in http authentication
    handler (CAN-2004-0982).


stable/main/source/mantis_0.17.1-3.diff.gz
stable/main/binary-all/mantis_0.17.1-3_all.deb
stable/main/source/mantis_0.17.1-3.dsc
mantis (0.17.1-3) stable-security; urgency=high
  * Fix insecure permissions in /etc/mantis/config.php (644) (Closes: #199022)


stable/main/binary-sparc/lvm10_1.0.4-5woody2_sparc.deb
lvm10 (1:1.0.4-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Trustix patch to correct insecure temporary directory creation
    [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972]


stable/main/binary-s390/lvm10_1.0.4-5woody2_s390.deb
lvm10 (1:1.0.4-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Trustix patch to correct insecure temporary directory creation
    [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972]


stable/main/binary-powerpc/lvm10_1.0.4-5woody2_powerpc.deb
lvm10 (1:1.0.4-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Trustix patch to correct insecure temporary directory creation
    [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972]


stable/main/binary-mips/lvm10_1.0.4-5woody2_mips.deb
lvm10 (1:1.0.4-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Trustix patch to correct insecure temporary directory creation
    [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972]


stable/main/binary-m68k/lvm10_1.0.4-5woody2_m68k.deb
lvm10 (1:1.0.4-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Trustix patch to correct insecure temporary directory creation
    [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972]


stable/main/binary-ia64/lvm10_1.0.4-5woody2_ia64.deb
lvm10 (1:1.0.4-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Trustix patch to correct insecure temporary directory creation
    [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972]


stable/main/binary-i386/lvm10_1.0.4-5woody2_i386.deb
lvm10 (1:1.0.4-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Trustix patch to correct insecure temporary directory creation
    [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972]


stable/main/binary-hppa/lvm10_1.0.4-5woody2_hppa.deb
lvm10 (1:1.0.4-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Trustix patch to correct insecure temporary directory creation
    [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972]


stable/main/binary-arm/lvm10_1.0.4-5woody2_arm.deb
lvm10 (1:1.0.4-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Trustix patch to correct insecure temporary directory creation
    [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972]


stable/main/binary-alpha/lvm10_1.0.4-5woody2_alpha.deb
lvm10 (1:1.0.4-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Trustix patch to correct insecure temporary directory creation
    [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972]


stable/main/source/lvm10_1.0.4-5woody2.dsc
stable/main/binary-mipsel/lvm10_1.0.4-5woody2_mipsel.deb
stable/main/source/lvm10_1.0.4-5woody2.diff.gz
lvm10 (1:1.0.4-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied Trustix patch to correct insecure temporary directory creation
    [1.0.4/tools/lvmcreate_initrd, CAN-2004-0972]


stable/main/binary-sparc/libxml2-dev_2.4.19-4woody2_sparc.deb
stable/main/binary-sparc/libxml2_2.4.19-4woody2_sparc.deb
libxml2 (2.4.19-4woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c,
    nanoftp.c, CAN-2004-0989]


stable/main/binary-s390/libxml2_2.4.19-4woody2_s390.deb
stable/main/binary-s390/libxml2-dev_2.4.19-4woody2_s390.deb
libxml2 (2.4.19-4woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c,
    nanoftp.c, CAN-2004-0989]


stable/main/binary-powerpc/libxml2-dev_2.4.19-4woody2_powerpc.deb
stable/main/binary-powerpc/libxml2_2.4.19-4woody2_powerpc.deb
libxml2 (2.4.19-4woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c,
    nanoftp.c, CAN-2004-0989]


stable/main/binary-mips/libxml2_2.4.19-4woody2_mips.deb
stable/main/binary-mips/libxml2-dev_2.4.19-4woody2_mips.deb
libxml2 (2.4.19-4woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c,
    nanoftp.c, CAN-2004-0989]


stable/main/binary-m68k/libxml2-dev_2.4.19-4woody2_m68k.deb
stable/main/binary-m68k/libxml2_2.4.19-4woody2_m68k.deb
libxml2 (2.4.19-4woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c,
    nanoftp.c, CAN-2004-0989]


stable/main/binary-ia64/libxml2_2.4.19-4woody2_ia64.deb
stable/main/binary-ia64/libxml2-dev_2.4.19-4woody2_ia64.deb
libxml2 (2.4.19-4woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c,
    nanoftp.c, CAN-2004-0989]


stable/main/binary-i386/libxml2-dev_2.4.19-4woody2_i386.deb
stable/main/binary-i386/libxml2_2.4.19-4woody2_i386.deb
libxml2 (2.4.19-4woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c,
    nanoftp.c, CAN-2004-0989]


stable/main/binary-hppa/libxml2_2.4.19-4woody2_hppa.deb
stable/main/binary-hppa/libxml2-dev_2.4.19-4woody2_hppa.deb
libxml2 (2.4.19-4woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c,
    nanoftp.c, CAN-2004-0989]


stable/main/binary-arm/libxml2_2.4.19-4woody2_arm.deb
stable/main/binary-arm/libxml2-dev_2.4.19-4woody2_arm.deb
libxml2 (2.4.19-4woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c,
    nanoftp.c, CAN-2004-0989]


stable/main/binary-alpha/libxml2_2.4.19-4woody2_alpha.deb
stable/main/binary-alpha/libxml2-dev_2.4.19-4woody2_alpha.deb
libxml2 (2.4.19-4woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c,
    nanoftp.c, CAN-2004-0989]


stable/main/binary-mipsel/libxml2_2.4.19-4woody2_mipsel.deb
stable/main/source/libxml2_2.4.19-4woody2.dsc
stable/main/binary-mipsel/libxml2-dev_2.4.19-4woody2_mipsel.deb
stable/main/source/libxml2_2.4.19-4woody2.diff.gz
libxml2 (2.4.19-4woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanohttp.c,
    nanoftp.c, CAN-2004-0989]


stable/main/binary-sparc/libxml-dev_1.8.17-2woody2_sparc.deb
stable/main/binary-sparc/libxml1_1.8.17-2woody2_sparc.deb
libxml (1:1.8.17-2woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c,
    CAN-2004-0989]


stable/main/binary-s390/libxml1_1.8.17-2woody2_s390.deb
stable/main/binary-s390/libxml-dev_1.8.17-2woody2_s390.deb
libxml (1:1.8.17-2woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c,
    CAN-2004-0989]


stable/main/binary-powerpc/libxml-dev_1.8.17-2woody2_powerpc.deb
stable/main/binary-powerpc/libxml1_1.8.17-2woody2_powerpc.deb
libxml (1:1.8.17-2woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c,
    CAN-2004-0989]


stable/main/binary-mips/libxml1_1.8.17-2woody2_mips.deb
stable/main/binary-mips/libxml-dev_1.8.17-2woody2_mips.deb
libxml (1:1.8.17-2woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c,
    CAN-2004-0989]


stable/main/binary-m68k/libxml-dev_1.8.17-2woody2_m68k.deb
stable/main/binary-m68k/libxml1_1.8.17-2woody2_m68k.deb
libxml (1:1.8.17-2woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c,
    CAN-2004-0989]


stable/main/binary-ia64/libxml1_1.8.17-2woody2_ia64.deb
stable/main/binary-ia64/libxml-dev_1.8.17-2woody2_ia64.deb
libxml (1:1.8.17-2woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c,
    CAN-2004-0989]


stable/main/binary-i386/libxml-dev_1.8.17-2woody2_i386.deb
stable/main/binary-i386/libxml1_1.8.17-2woody2_i386.deb
libxml (1:1.8.17-2woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c,
    CAN-2004-0989]


stable/main/binary-hppa/libxml1_1.8.17-2woody2_hppa.deb
stable/main/binary-hppa/libxml-dev_1.8.17-2woody2_hppa.deb
libxml (1:1.8.17-2woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c,
    CAN-2004-0989]


stable/main/binary-arm/libxml1_1.8.17-2woody2_arm.deb
stable/main/binary-arm/libxml-dev_1.8.17-2woody2_arm.deb
libxml (1:1.8.17-2woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c,
    CAN-2004-0989]


stable/main/binary-alpha/libxml1_1.8.17-2woody2_alpha.deb
stable/main/binary-alpha/libxml-dev_1.8.17-2woody2_alpha.deb
libxml (1:1.8.17-2woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c,
    CAN-2004-0989]


stable/main/source/libxml_1.8.17-2woody2.diff.gz
stable/main/binary-mipsel/libxml-dev_1.8.17-2woody2_mipsel.deb
stable/main/binary-mipsel/libxml1_1.8.17-2woody2_mipsel.deb
stable/main/source/libxml_1.8.17-2woody2.dsc
libxml (1:1.8.17-2woody2) stable-security; urgency=high
  * Backport patch from libxml2-2.6.15 to fix buffer overflows [nanoftp.c,
    CAN-2004-0989]


stable/main/binary-sparc/libgd2_2.0.1-10woody2_sparc.deb
stable/main/binary-sparc/libgd-tools_2.0.1-10woody2_sparc.deb
stable/main/binary-sparc/libgd2-noxpm_2.0.1-10woody2_sparc.deb
stable/main/binary-sparc/libgd2-dev_2.0.1-10woody2_sparc.deb
libgd2 (2.0.1-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]
  * Added nother integer overflow precaution by Stew Benedict
    <sbenedict@mandrakesoft.com> [gd_png.c]


stable/main/binary-s390/libgd2_2.0.1-10woody2_s390.deb
stable/main/binary-s390/libgd-tools_2.0.1-10woody2_s390.deb
stable/main/binary-s390/libgd2-dev_2.0.1-10woody2_s390.deb
stable/main/binary-s390/libgd2-noxpm_2.0.1-10woody2_s390.deb
libgd2 (2.0.1-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]
  * Added nother integer overflow precaution by Stew Benedict
    <sbenedict@mandrakesoft.com> [gd_png.c]


stable/main/binary-powerpc/libgd2-dev_2.0.1-10woody2_powerpc.deb
stable/main/binary-powerpc/libgd-tools_2.0.1-10woody2_powerpc.deb
stable/main/binary-powerpc/libgd2_2.0.1-10woody2_powerpc.deb
stable/main/binary-powerpc/libgd2-noxpm_2.0.1-10woody2_powerpc.deb
libgd2 (2.0.1-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]
  * Added nother integer overflow precaution by Stew Benedict
    <sbenedict@mandrakesoft.com> [gd_png.c]


stable/main/binary-mips/libgd-tools_2.0.1-10woody2_mips.deb
stable/main/binary-mips/libgd2-noxpm_2.0.1-10woody2_mips.deb
stable/main/binary-mips/libgd2_2.0.1-10woody2_mips.deb
stable/main/binary-mips/libgd2-dev_2.0.1-10woody2_mips.deb
libgd2 (2.0.1-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]
  * Added nother integer overflow precaution by Stew Benedict
    <sbenedict@mandrakesoft.com> [gd_png.c]


stable/main/binary-m68k/libgd2-noxpm_2.0.1-10woody2_m68k.deb
stable/main/binary-m68k/libgd-tools_2.0.1-10woody2_m68k.deb
stable/main/binary-m68k/libgd2-dev_2.0.1-10woody2_m68k.deb
stable/main/binary-m68k/libgd2_2.0.1-10woody2_m68k.deb
libgd2 (2.0.1-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]
  * Added nother integer overflow precaution by Stew Benedict
    <sbenedict@mandrakesoft.com> [gd_png.c]


stable/main/binary-ia64/libgd2_2.0.1-10woody2_ia64.deb
stable/main/binary-ia64/libgd2-noxpm_2.0.1-10woody2_ia64.deb
stable/main/binary-ia64/libgd2-dev_2.0.1-10woody2_ia64.deb
stable/main/binary-ia64/libgd-tools_2.0.1-10woody2_ia64.deb
libgd2 (2.0.1-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]
  * Added nother integer overflow precaution by Stew Benedict
    <sbenedict@mandrakesoft.com> [gd_png.c]


stable/main/binary-i386/libgd2-dev_2.0.1-10woody2_i386.deb
stable/main/binary-i386/libgd2_2.0.1-10woody2_i386.deb
stable/main/binary-i386/libgd2-noxpm_2.0.1-10woody2_i386.deb
stable/main/binary-i386/libgd-tools_2.0.1-10woody2_i386.deb
libgd2 (2.0.1-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]
  * Added nother integer overflow precaution by Stew Benedict
    <sbenedict@mandrakesoft.com> [gd_png.c]


stable/main/binary-hppa/libgd2_2.0.1-10woody2_hppa.deb
stable/main/binary-hppa/libgd2-noxpm_2.0.1-10woody2_hppa.deb
stable/main/binary-hppa/libgd-tools_2.0.1-10woody2_hppa.deb
stable/main/binary-hppa/libgd2-dev_2.0.1-10woody2_hppa.deb
libgd2 (2.0.1-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]
  * Added nother integer overflow precaution by Stew Benedict
    <sbenedict@mandrakesoft.com> [gd_png.c]


stable/main/binary-arm/libgd2_2.0.1-10woody2_arm.deb
stable/main/binary-arm/libgd2-noxpm_2.0.1-10woody2_arm.deb
stable/main/binary-arm/libgd2-dev_2.0.1-10woody2_arm.deb
stable/main/binary-arm/libgd-tools_2.0.1-10woody2_arm.deb
libgd2 (2.0.1-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]
  * Added nother integer overflow precaution by Stew Benedict
    <sbenedict@mandrakesoft.com> [gd_png.c]


stable/main/binary-alpha/libgd-tools_2.0.1-10woody2_alpha.deb
stable/main/binary-alpha/libgd2_2.0.1-10woody2_alpha.deb
stable/main/binary-alpha/libgd2-noxpm_2.0.1-10woody2_alpha.deb
stable/main/binary-alpha/libgd2-dev_2.0.1-10woody2_alpha.deb
libgd2 (2.0.1-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]
  * Added nother integer overflow precaution by Stew Benedict
    <sbenedict@mandrakesoft.com> [gd_png.c]


stable/main/binary-mipsel/libgd2-noxpm_2.0.1-10woody2_mipsel.deb
stable/main/binary-mipsel/libgd2_2.0.1-10woody2_mipsel.deb
stable/main/source/libgd2_2.0.1-10woody2.dsc
stable/main/binary-mipsel/libgd-tools_2.0.1-10woody2_mipsel.deb
stable/main/source/libgd2_2.0.1-10woody2.diff.gz
stable/main/binary-mipsel/libgd2-dev_2.0.1-10woody2_mipsel.deb
libgd2 (2.0.1-10woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added overflow and failed malloc protections to prevend buffer
    overflows that could lead to arbitrary code execution [gd.c, wbmp.c,
    gd_gd.c, gd_io_dp.c, gdxpm.c, CAN-2004-0941, CAN-2004-0990]
  * Added missing free() [gd_png.c]
  * Added nother integer overflow precaution by Stew Benedict
    <sbenedict@mandrakesoft.com> [gd_png.c]


stable/main/source/libcrypt-passwdmd5-perl_1.2-3woody1.dsc
stable/main/binary-all/libcrypt-passwdmd5-perl_1.2-3woody1_all.deb
stable/main/source/libcrypt-passwdmd5-perl_1.2-3woody1.diff.gz
libcrypt-passwdmd5-perl (1.2-3woody1) stable; urgency=medium
  * NMU
  * Added missing dependency to libdigest-md5-perl so the package is
    installable again (Closes: #159057)


stable/main/binary-sparc/l2tpd_0.67-1.2_sparc.deb
l2tpd (0.67-1.2) stable-security; urgency=high
  * Fix for bss based overflow in write_packet(). (CAN-2004-0649)


stable/main/binary-s390/l2tpd_0.67-1.2_s390.deb
l2tpd (0.67-1.2) stable-security; urgency=high
  * Fix for bss based overflow in write_packet(). (CAN-2004-0649)


stable/main/binary-powerpc/l2tpd_0.67-1.2_powerpc.deb
l2tpd (0.67-1.2) stable-security; urgency=high
  * Fix for bss based overflow in write_packet(). (CAN-2004-0649)


stable/main/binary-mipsel/l2tpd_0.67-1.2_mipsel.deb
l2tpd (0.67-1.2) stable-security; urgency=high
  * Fix for bss based overflow in write_packet(). (CAN-2004-0649)


stable/main/binary-mips/l2tpd_0.67-1.2_mips.deb
l2tpd (0.67-1.2) stable-security; urgency=high
  * Fix for bss based overflow in write_packet(). (CAN-2004-0649)


stable/main/binary-m68k/l2tpd_0.67-1.2_m68k.deb
l2tpd (0.67-1.2) stable-security; urgency=high
  * Fix for bss based overflow in write_packet(). (CAN-2004-0649)


stable/main/binary-ia64/l2tpd_0.67-1.2_ia64.deb
l2tpd (0.67-1.2) stable-security; urgency=high
  * Fix for bss based overflow in write_packet(). (CAN-2004-0649)


stable/main/binary-hppa/l2tpd_0.67-1.2_hppa.deb
l2tpd (0.67-1.2) stable-security; urgency=high
  * Fix for bss based overflow in write_packet(). (CAN-2004-0649)


stable/main/binary-arm/l2tpd_0.67-1.2_arm.deb
l2tpd (0.67-1.2) stable-security; urgency=high
  * Fix for bss based overflow in write_packet(). (CAN-2004-0649)


stable/main/binary-alpha/l2tpd_0.67-1.2_alpha.deb
l2tpd (0.67-1.2) stable-security; urgency=high
  * Fix for bss based overflow in write_packet(). (CAN-2004-0649)


stable/main/source/l2tpd_0.67-1.2.diff.gz
stable/main/binary-i386/l2tpd_0.67-1.2_i386.deb
stable/main/source/l2tpd_0.67-1.2.dsc
l2tpd (0.67-1.2) stable-security; urgency=high
  * Fix for bss based overflow in write_packet(). (CAN-2004-0649)


stable/main/binary-powerpc/kernel-image-2.4.18-powerpc_2.4.18-1woody5_powerpc.deb
stable/main/source/kernel-patch-2.4.18-powerpc_2.4.18-1woody5.dsc
stable/main/binary-powerpc/kernel-image-2.4.18-newpmac_2.4.18-1woody5_powerpc.deb
stable/main/binary-powerpc/kernel-headers-2.4.18_2.4.18-1woody5_powerpc.deb
stable/main/binary-all/kernel-patch-2.4.18-powerpc_2.4.18-1woody5_all.deb
stable/main/binary-powerpc/kernel-image-2.4.18-powerpc-smp_2.4.18-1woody5_powerpc.deb
stable/main/source/kernel-patch-2.4.18-powerpc_2.4.18-1woody5.tar.gz
kernel-patch-2.4.18-powerpc (2.4.18-1woody5) stable-security; urgency=low
  * Built against kernel-source-2.4.18 version 2.4.18-14.3 to pick up :
    - Applied patch by Petr Vandrovec <vandrove@vc.cvut.cz> to fix a
      possible roothole in ncpfs discovered by Arjan van de Ven
      <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
    - Applied patch by Sebastian Krahmer <krahmer@suse.de> and Ernie
      Petrides <petrides@redhat.com> to fix a local root exploit in iso9660
      [fs/isofs/rock.c, CAN-2004-0109]
    - Applied patch by Alan Cox and Thomas Biege to fix local root exploit
      in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003,
      drivers/char/drm-4.0/r128_state.c]
    - Applied additional patch by Ernie Petrides <petrides@redhat.com> to
      fix another intance of the same
    - Applied patch by Theodore Ts'o <tytso@mit.edu> to fix an information
      leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177]
    - Applied patch by Andreas Kies <andikies@t-online.de> to fix local
      denial of service in the Sound Blaster driver
      [drivers/sound/sb_audio.c, CAN-2004-0178]


stable/main/binary-all/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.3_all.deb
stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.3.diff.gz
stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.3.dsc
kernel-patch-2.4.17-s390 (0.0.20020816-0.woody.3) stable-security; urgency=high
  * Rebuild against latest kernel-source-2.4.17-1woody2, which includes
    the follwing additional security fixes:
    - Applied patch by Petr Vandrovec <vandrove@vc.cvut.cz> to fix a
      possible roothole in ncpfs discovered by Arjan van de Ven
      <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
    - Applied patch by Sebastian Krahmer <krahmer@suse.de> and Ernie
      Petrides <petrides@redhat.com> to fix a local root exploit in iso9660
      [fs/isofs/rock.c, CAN-2004-0109]
    - Applied patch by Alan Cox and Thomas Biege to fix local root exploit
      in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003]
    - Applied additional patch by Ernie Petrides <petrides@redhat.com> to
      fix another intance of the same
    - Applied patch by Theodore Ts'o <tytso@mit.edu> to fix an information
      leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177]
    - Applied patch by Andreas Kies <andikies@t-online.de> to fix local
      denial of service in the Sound Blaster driver
      [drivers/sound/sb_audio.c, CAN-2004-0178]


stable/main/binary-sparc/iptables-dev_1.2.6a-5.0woody2_sparc.deb
stable/main/binary-sparc/iptables_1.2.6a-5.0woody2_sparc.deb
iptables (1.2.6a-5.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Mikko Rapeli to fix a bug that prevents loading of
    required modules [iptables.c, ip6tables.c, CAN-2004-0986]


stable/main/binary-s390/iptables_1.2.6a-5.0woody2_s390.deb
stable/main/binary-s390/iptables-dev_1.2.6a-5.0woody2_s390.deb
iptables (1.2.6a-5.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Mikko Rapeli to fix a bug that prevents loading of
    required modules [iptables.c, ip6tables.c, CAN-2004-0986]


stable/main/binary-powerpc/iptables-dev_1.2.6a-5.0woody2_powerpc.deb
stable/main/binary-powerpc/iptables_1.2.6a-5.0woody2_powerpc.deb
iptables (1.2.6a-5.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Mikko Rapeli to fix a bug that prevents loading of
    required modules [iptables.c, ip6tables.c, CAN-2004-0986]


stable/main/binary-mips/iptables_1.2.6a-5.0woody2_mips.deb
stable/main/binary-mips/iptables-dev_1.2.6a-5.0woody2_mips.deb
iptables (1.2.6a-5.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Mikko Rapeli to fix a bug that prevents loading of
    required modules [iptables.c, ip6tables.c, CAN-2004-0986]


stable/main/binary-m68k/iptables-dev_1.2.6a-5.0woody2_m68k.deb
stable/main/binary-m68k/iptables_1.2.6a-5.0woody2_m68k.deb
iptables (1.2.6a-5.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Mikko Rapeli to fix a bug that prevents loading of
    required modules [iptables.c, ip6tables.c, CAN-2004-0986]


stable/main/binary-ia64/iptables_1.2.6a-5.0woody2_ia64.deb
stable/main/binary-ia64/iptables-dev_1.2.6a-5.0woody2_ia64.deb
iptables (1.2.6a-5.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Mikko Rapeli to fix a bug that prevents loading of
    required modules [iptables.c, ip6tables.c, CAN-2004-0986]


stable/main/binary-i386/iptables-dev_1.2.6a-5.0woody2_i386.deb
stable/main/binary-i386/iptables_1.2.6a-5.0woody2_i386.deb
iptables (1.2.6a-5.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Mikko Rapeli to fix a bug that prevents loading of
    required modules [iptables.c, ip6tables.c, CAN-2004-0986]


stable/main/binary-hppa/iptables_1.2.6a-5.0woody2_hppa.deb
stable/main/binary-hppa/iptables-dev_1.2.6a-5.0woody2_hppa.deb
iptables (1.2.6a-5.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Mikko Rapeli to fix a bug that prevents loading of
    required modules [iptables.c, ip6tables.c, CAN-2004-0986]


stable/main/binary-arm/iptables_1.2.6a-5.0woody2_arm.deb
stable/main/binary-arm/iptables-dev_1.2.6a-5.0woody2_arm.deb
iptables (1.2.6a-5.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Mikko Rapeli to fix a bug that prevents loading of
    required modules [iptables.c, ip6tables.c, CAN-2004-0986]


stable/main/binary-alpha/iptables_1.2.6a-5.0woody2_alpha.deb
stable/main/binary-alpha/iptables-dev_1.2.6a-5.0woody2_alpha.deb
iptables (1.2.6a-5.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Mikko Rapeli to fix a bug that prevents loading of
    required modules [iptables.c, ip6tables.c, CAN-2004-0986]


stable/main/binary-mipsel/iptables_1.2.6a-5.0woody2_mipsel.deb
stable/main/source/iptables_1.2.6a-5.0woody2.dsc
stable/main/binary-mipsel/iptables-dev_1.2.6a-5.0woody2_mipsel.deb
stable/main/source/iptables_1.2.6a-5.0woody2.diff.gz
iptables (1.2.6a-5.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Mikko Rapeli to fix a bug that prevents loading of
    required modules [iptables.c, ip6tables.c, CAN-2004-0986]


stable/main/binary-sparc/imlib-progs_1.9.14-2woody2_sparc.deb
stable/main/binary-sparc/imlib1_1.9.14-2woody2_sparc.deb
stable/main/binary-sparc/gdk-imlib1_1.9.14-2woody2_sparc.deb
stable/main/binary-sparc/imlib-dev_1.9.14-2woody2_sparc.deb
stable/main/binary-sparc/gdk-imlib-dev_1.9.14-2woody2_sparc.deb
imlib (1.9.14-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied corrections to fix multiple heap and integer overflows
    [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c,
    gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c,
    gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026]
  * Corrected the patch, thanks to Steve Langasek [Imlib/load.c]


stable/main/binary-s390/gdk-imlib-dev_1.9.14-2woody2_s390.deb
stable/main/binary-s390/imlib1_1.9.14-2woody2_s390.deb
stable/main/binary-s390/imlib-dev_1.9.14-2woody2_s390.deb
stable/main/binary-s390/gdk-imlib1_1.9.14-2woody2_s390.deb
stable/main/binary-s390/imlib-progs_1.9.14-2woody2_s390.deb
imlib (1.9.14-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied corrections to fix multiple heap and integer overflows
    [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c,
    gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c,
    gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026]
  * Corrected the patch, thanks to Steve Langasek [Imlib/load.c]


stable/main/binary-powerpc/gdk-imlib1_1.9.14-2woody2_powerpc.deb
stable/main/binary-powerpc/imlib-progs_1.9.14-2woody2_powerpc.deb
stable/main/binary-powerpc/gdk-imlib-dev_1.9.14-2woody2_powerpc.deb
stable/main/binary-powerpc/imlib-dev_1.9.14-2woody2_powerpc.deb
stable/main/binary-powerpc/imlib1_1.9.14-2woody2_powerpc.deb
imlib (1.9.14-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied corrections to fix multiple heap and integer overflows
    [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c,
    gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c,
    gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026]
  * Corrected the patch, thanks to Steve Langasek [Imlib/load.c]


stable/main/binary-mips/gdk-imlib1_1.9.14-2woody2_mips.deb
stable/main/binary-mips/gdk-imlib-dev_1.9.14-2woody2_mips.deb
stable/main/binary-mips/imlib1_1.9.14-2woody2_mips.deb
stable/main/binary-mips/imlib-dev_1.9.14-2woody2_mips.deb
stable/main/binary-mips/imlib-progs_1.9.14-2woody2_mips.deb
imlib (1.9.14-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied corrections to fix multiple heap and integer overflows
    [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c,
    gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c,
    gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026]
  * Corrected the patch, thanks to Steve Langasek [Imlib/load.c]


stable/main/binary-m68k/gdk-imlib-dev_1.9.14-2woody2_m68k.deb
stable/main/binary-m68k/imlib-progs_1.9.14-2woody2_m68k.deb
stable/main/binary-m68k/imlib-dev_1.9.14-2woody2_m68k.deb
stable/main/binary-m68k/imlib1_1.9.14-2woody2_m68k.deb
stable/main/binary-m68k/gdk-imlib1_1.9.14-2woody2_m68k.deb
imlib (1.9.14-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied corrections to fix multiple heap and integer overflows
    [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c,
    gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c,
    gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026]
  * Corrected the patch, thanks to Steve Langasek [Imlib/load.c]


stable/main/binary-ia64/gdk-imlib-dev_1.9.14-2woody2_ia64.deb
stable/main/binary-ia64/imlib-progs_1.9.14-2woody2_ia64.deb
stable/main/binary-ia64/imlib1_1.9.14-2woody2_ia64.deb
stable/main/binary-ia64/gdk-imlib1_1.9.14-2woody2_ia64.deb
stable/main/binary-ia64/imlib-dev_1.9.14-2woody2_ia64.deb
imlib (1.9.14-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied corrections to fix multiple heap and integer overflows
    [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c,
    gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c,
    gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026]
  * Corrected the patch, thanks to Steve Langasek [Imlib/load.c]


stable/main/binary-i386/imlib-progs_1.9.14-2woody2_i386.deb
stable/main/binary-i386/gdk-imlib-dev_1.9.14-2woody2_i386.deb
stable/main/binary-i386/imlib1_1.9.14-2woody2_i386.deb
stable/main/binary-i386/imlib-dev_1.9.14-2woody2_i386.deb
stable/main/binary-i386/gdk-imlib1_1.9.14-2woody2_i386.deb
imlib (1.9.14-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied corrections to fix multiple heap and integer overflows
    [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c,
    gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c,
    gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026]
  * Corrected the patch, thanks to Steve Langasek [Imlib/load.c]


stable/main/binary-hppa/gdk-imlib-dev_1.9.14-2woody2_hppa.deb
stable/main/binary-hppa/imlib-dev_1.9.14-2woody2_hppa.deb
stable/main/binary-hppa/gdk-imlib1_1.9.14-2woody2_hppa.deb
stable/main/binary-hppa/imlib1_1.9.14-2woody2_hppa.deb
stable/main/binary-hppa/imlib-progs_1.9.14-2woody2_hppa.deb
imlib (1.9.14-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied corrections to fix multiple heap and integer overflows
    [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c,
    gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c,
    gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026]
  * Corrected the patch, thanks to Steve Langasek [Imlib/load.c]


stable/main/binary-arm/imlib1_1.9.14-2woody2_arm.deb
stable/main/binary-arm/imlib-dev_1.9.14-2woody2_arm.deb
stable/main/binary-arm/gdk-imlib-dev_1.9.14-2woody2_arm.deb
stable/main/binary-arm/gdk-imlib1_1.9.14-2woody2_arm.deb
stable/main/binary-arm/imlib-progs_1.9.14-2woody2_arm.deb
imlib (1.9.14-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied corrections to fix multiple heap and integer overflows
    [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c,
    gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c,
    gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026]
  * Corrected the patch, thanks to Steve Langasek [Imlib/load.c]


stable/main/binary-alpha/gdk-imlib-dev_1.9.14-2woody2_alpha.deb
stable/main/binary-alpha/imlib-dev_1.9.14-2woody2_alpha.deb
stable/main/binary-alpha/imlib-progs_1.9.14-2woody2_alpha.deb
stable/main/binary-alpha/imlib1_1.9.14-2woody2_alpha.deb
stable/main/binary-alpha/gdk-imlib1_1.9.14-2woody2_alpha.deb
imlib (1.9.14-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied corrections to fix multiple heap and integer overflows
    [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c,
    gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c,
    gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026]
  * Corrected the patch, thanks to Steve Langasek [Imlib/load.c]


stable/main/source/imlib_1.9.14-2woody2.diff.gz
stable/main/source/imlib_1.9.14-2woody2.dsc
stable/main/binary-mipsel/gdk-imlib1_1.9.14-2woody2_mipsel.deb
stable/main/binary-mipsel/imlib-progs_1.9.14-2woody2_mipsel.deb
stable/main/binary-mipsel/gdk-imlib-dev_1.9.14-2woody2_mipsel.deb
stable/main/binary-all/imlib-base_1.9.14-2woody2_all.deb
stable/main/binary-mipsel/imlib1_1.9.14-2woody2_mipsel.deb
stable/main/binary-mipsel/imlib-dev_1.9.14-2woody2_mipsel.deb
imlib (1.9.14-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied corrections to fix multiple heap and integer overflows
    [Imlib/load.c, Imlib/utils.c, gdk_imlib/io-ppm.c, gdk_imlib/io-xpm.c,
    gdk_imlib/misc.c, gdk_imlib/io-gif.c, gdk_imlib/utils.c,
    gdk_imlib/io-tiff.c, CAN-2004-1025, CAN-2004-1026]
  * Corrected the patch, thanks to Steve Langasek [Imlib/load.c]


stable/main/binary-sparc/libmagick++5_5.4.4.5-1woody4_sparc.deb
stable/main/binary-sparc/libmagick++5-dev_5.4.4.5-1woody4_sparc.deb
stable/main/binary-sparc/libmagick5_5.4.4.5-1woody4_sparc.deb
stable/main/binary-sparc/perlmagick_5.4.4.5-1woody4_sparc.deb
stable/main/binary-sparc/imagemagick_5.4.4.5-1woody4_sparc.deb
stable/main/binary-sparc/libmagick5-dev_5.4.4.5-1woody4_sparc.deb
imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Applied patch to fix arbitrary code execution [magick/attribute.c,
    CAN-2004-0981, Bug#278401)


stable/main/binary-s390/libmagick++5_5.4.4.5-1woody4_s390.deb
stable/main/binary-s390/perlmagick_5.4.4.5-1woody4_s390.deb
stable/main/binary-s390/libmagick5_5.4.4.5-1woody4_s390.deb
stable/main/binary-s390/libmagick++5-dev_5.4.4.5-1woody4_s390.deb
stable/main/binary-s390/imagemagick_5.4.4.5-1woody4_s390.deb
stable/main/binary-s390/libmagick5-dev_5.4.4.5-1woody4_s390.deb
imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Applied patch to fix arbitrary code execution [magick/attribute.c,
    CAN-2004-0981, Bug#278401)


stable/main/binary-powerpc/libmagick++5-dev_5.4.4.5-1woody4_powerpc.deb
stable/main/binary-powerpc/imagemagick_5.4.4.5-1woody4_powerpc.deb
stable/main/binary-powerpc/perlmagick_5.4.4.5-1woody4_powerpc.deb
stable/main/binary-powerpc/libmagick++5_5.4.4.5-1woody4_powerpc.deb
stable/main/binary-powerpc/libmagick5_5.4.4.5-1woody4_powerpc.deb
stable/main/binary-powerpc/libmagick5-dev_5.4.4.5-1woody4_powerpc.deb
imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Applied patch to fix arbitrary code execution [magick/attribute.c,
    CAN-2004-0981, Bug#278401)


stable/main/binary-mips/libmagick++5_5.4.4.5-1woody4_mips.deb
stable/main/binary-mips/imagemagick_5.4.4.5-1woody4_mips.deb
stable/main/binary-mips/perlmagick_5.4.4.5-1woody4_mips.deb
stable/main/binary-mips/libmagick5_5.4.4.5-1woody4_mips.deb
stable/main/binary-mips/libmagick5-dev_5.4.4.5-1woody4_mips.deb
stable/main/binary-mips/libmagick++5-dev_5.4.4.5-1woody4_mips.deb
imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Applied patch to fix arbitrary code execution [magick/attribute.c,
    CAN-2004-0981, Bug#278401)


stable/main/binary-m68k/libmagick5-dev_5.4.4.5-1woody4_m68k.deb
stable/main/binary-m68k/libmagick++5-dev_5.4.4.5-1woody4_m68k.deb
stable/main/binary-m68k/libmagick5_5.4.4.5-1woody4_m68k.deb
stable/main/binary-m68k/imagemagick_5.4.4.5-1woody4_m68k.deb
stable/main/binary-m68k/libmagick++5_5.4.4.5-1woody4_m68k.deb
stable/main/binary-m68k/perlmagick_5.4.4.5-1woody4_m68k.deb
imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Applied patch to fix arbitrary code execution [magick/attribute.c,
    CAN-2004-0981, Bug#278401)


stable/main/binary-ia64/imagemagick_5.4.4.5-1woody4_ia64.deb
stable/main/binary-ia64/perlmagick_5.4.4.5-1woody4_ia64.deb
stable/main/binary-ia64/libmagick5_5.4.4.5-1woody4_ia64.deb
stable/main/binary-ia64/libmagick++5-dev_5.4.4.5-1woody4_ia64.deb
stable/main/binary-ia64/libmagick++5_5.4.4.5-1woody4_ia64.deb
stable/main/binary-ia64/libmagick5-dev_5.4.4.5-1woody4_ia64.deb
imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Applied patch to fix arbitrary code execution [magick/attribute.c,
    CAN-2004-0981, Bug#278401)


stable/main/binary-i386/perlmagick_5.4.4.5-1woody4_i386.deb
stable/main/binary-i386/libmagick5-dev_5.4.4.5-1woody4_i386.deb
stable/main/binary-i386/libmagick++5_5.4.4.5-1woody4_i386.deb
stable/main/binary-i386/libmagick++5-dev_5.4.4.5-1woody4_i386.deb
stable/main/binary-i386/libmagick5_5.4.4.5-1woody4_i386.deb
stable/main/binary-i386/imagemagick_5.4.4.5-1woody4_i386.deb
imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Applied patch to fix arbitrary code execution [magick/attribute.c,
    CAN-2004-0981, Bug#278401)


stable/main/binary-hppa/imagemagick_5.4.4.5-1woody4_hppa.deb
stable/main/binary-hppa/libmagick++5_5.4.4.5-1woody4_hppa.deb
stable/main/binary-hppa/libmagick5-dev_5.4.4.5-1woody4_hppa.deb
stable/main/binary-hppa/libmagick5_5.4.4.5-1woody4_hppa.deb
stable/main/binary-hppa/libmagick++5-dev_5.4.4.5-1woody4_hppa.deb
stable/main/binary-hppa/perlmagick_5.4.4.5-1woody4_hppa.deb
imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Applied patch to fix arbitrary code execution [magick/attribute.c,
    CAN-2004-0981, Bug#278401)


stable/main/binary-arm/libmagick5-dev_5.4.4.5-1woody4_arm.deb
stable/main/binary-arm/libmagick++5_5.4.4.5-1woody4_arm.deb
stable/main/binary-arm/libmagick5_5.4.4.5-1woody4_arm.deb
stable/main/binary-arm/libmagick++5-dev_5.4.4.5-1woody4_arm.deb
stable/main/binary-arm/imagemagick_5.4.4.5-1woody4_arm.deb
stable/main/binary-arm/perlmagick_5.4.4.5-1woody4_arm.deb
imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Applied patch to fix arbitrary code execution [magick/attribute.c,
    CAN-2004-0981, Bug#278401)


stable/main/binary-alpha/libmagick5-dev_5.4.4.5-1woody4_alpha.deb
stable/main/binary-alpha/perlmagick_5.4.4.5-1woody4_alpha.deb
stable/main/binary-alpha/imagemagick_5.4.4.5-1woody4_alpha.deb
stable/main/binary-alpha/libmagick5_5.4.4.5-1woody4_alpha.deb
stable/main/binary-alpha/libmagick++5-dev_5.4.4.5-1woody4_alpha.deb
stable/main/binary-alpha/libmagick++5_5.4.4.5-1woody4_alpha.deb
imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Applied patch to fix arbitrary code execution [magick/attribute.c,
    CAN-2004-0981, Bug#278401)


stable/main/binary-mipsel/libmagick5-dev_5.4.4.5-1woody4_mipsel.deb
stable/main/binary-mipsel/perlmagick_5.4.4.5-1woody4_mipsel.deb
stable/main/source/imagemagick_5.4.4.5-1woody4.dsc
stable/main/binary-mipsel/imagemagick_5.4.4.5-1woody4_mipsel.deb
stable/main/source/imagemagick_5.4.4.5-1woody4.diff.gz
stable/main/binary-mipsel/libmagick++5-dev_5.4.4.5-1woody4_mipsel.deb
stable/main/binary-mipsel/libmagick5_5.4.4.5-1woody4_mipsel.deb
stable/main/binary-mipsel/libmagick++5_5.4.4.5-1woody4_mipsel.deb
imagemagick (4:5.4.4.5-1woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Applied patch to fix arbitrary code execution [magick/attribute.c,
    CAN-2004-0981, Bug#278401)


stable/main/binary-sparc/htget_0.93-1.1woody1_sparc.deb
htget (0.93-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Correctly limit reads from network to prevent remotely triggerable
    buffer overflow.  [htget.c CAN-2004-0852]


stable/main/binary-s390/htget_0.93-1.1woody1_s390.deb
htget (0.93-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Correctly limit reads from network to prevent remotely triggerable
    buffer overflow.  [htget.c CAN-2004-0852]


stable/main/binary-powerpc/htget_0.93-1.1woody1_powerpc.deb
htget (0.93-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Correctly limit reads from network to prevent remotely triggerable
    buffer overflow.  [htget.c CAN-2004-0852]


stable/main/binary-mips/htget_0.93-1.1woody1_mips.deb
htget (0.93-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Correctly limit reads from network to prevent remotely triggerable
    buffer overflow.  [htget.c CAN-2004-0852]


stable/main/binary-m68k/htget_0.93-1.1woody1_m68k.deb
htget (0.93-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Correctly limit reads from network to prevent remotely triggerable
    buffer overflow.  [htget.c CAN-2004-0852]


stable/main/binary-ia64/htget_0.93-1.1woody1_ia64.deb
htget (0.93-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Correctly limit reads from network to prevent remotely triggerable
    buffer overflow.  [htget.c CAN-2004-0852]


stable/main/binary-i386/htget_0.93-1.1woody1_i386.deb
htget (0.93-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Correctly limit reads from network to prevent remotely triggerable
    buffer overflow.  [htget.c CAN-2004-0852]


stable/main/binary-hppa/htget_0.93-1.1woody1_hppa.deb
htget (0.93-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Correctly limit reads from network to prevent remotely triggerable
    buffer overflow.  [htget.c CAN-2004-0852]


stable/main/binary-arm/htget_0.93-1.1woody1_arm.deb
htget (0.93-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Correctly limit reads from network to prevent remotely triggerable
    buffer overflow.  [htget.c CAN-2004-0852]


stable/main/binary-alpha/htget_0.93-1.1woody1_alpha.deb
htget (0.93-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Correctly limit reads from network to prevent remotely triggerable
    buffer overflow.  [htget.c CAN-2004-0852]


stable/main/binary-mipsel/htget_0.93-1.1woody1_mipsel.deb
stable/main/source/htget_0.93-1.1woody1.dsc
stable/main/source/htget_0.93-1.1woody1.tar.gz
htget (0.93-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Correctly limit reads from network to prevent remotely triggerable
    buffer overflow.  [htget.c CAN-2004-0852]


stable/main/binary-sparc/hpsockd_0.6.woody1_sparc.deb
hpsockd (0.6.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to mitigate denial of service
    [src/sockd/v5udp.c, CAN-2004-0993]


stable/main/binary-s390/hpsockd_0.6.woody1_s390.deb
hpsockd (0.6.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to mitigate denial of service
    [src/sockd/v5udp.c, CAN-2004-0993]


stable/main/binary-powerpc/hpsockd_0.6.woody1_powerpc.deb
hpsockd (0.6.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to mitigate denial of service
    [src/sockd/v5udp.c, CAN-2004-0993]


stable/main/binary-mips/hpsockd_0.6.woody1_mips.deb
hpsockd (0.6.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to mitigate denial of service
    [src/sockd/v5udp.c, CAN-2004-0993]


stable/main/binary-m68k/hpsockd_0.6.woody1_m68k.deb
hpsockd (0.6.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to mitigate denial of service
    [src/sockd/v5udp.c, CAN-2004-0993]


stable/main/binary-ia64/hpsockd_0.6.woody1_ia64.deb
hpsockd (0.6.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to mitigate denial of service
    [src/sockd/v5udp.c, CAN-2004-0993]


stable/main/binary-i386/hpsockd_0.6.woody1_i386.deb
hpsockd (0.6.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to mitigate denial of service
    [src/sockd/v5udp.c, CAN-2004-0993]


stable/main/binary-hppa/hpsockd_0.6.woody1_hppa.deb
hpsockd (0.6.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to mitigate denial of service
    [src/sockd/v5udp.c, CAN-2004-0993]


stable/main/binary-arm/hpsockd_0.6.woody1_arm.deb
hpsockd (0.6.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to mitigate denial of service
    [src/sockd/v5udp.c, CAN-2004-0993]


stable/main/binary-alpha/hpsockd_0.6.woody1_alpha.deb
hpsockd (0.6.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to mitigate denial of service
    [src/sockd/v5udp.c, CAN-2004-0993]


stable/main/binary-mipsel/hpsockd_0.6.woody1_mipsel.deb
stable/main/source/hpsockd_0.6.woody1.dsc
stable/main/source/hpsockd_0.6.woody1.tar.gz
hpsockd (0.6.woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to mitigate denial of service
    [src/sockd/v5udp.c, CAN-2004-0993]


stable/main/binary-sparc/gzip_1.3.2-3woody3_sparc.deb
gzip (1.3.2-3woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Revert patches for zdiff and znew since the use of 'set -C' should
    indeed be sufficient.


stable/main/binary-s390/gzip_1.3.2-3woody3_s390.deb
gzip (1.3.2-3woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Revert patches for zdiff and znew since the use of 'set -C' should
    indeed be sufficient.


stable/main/binary-powerpc/gzip_1.3.2-3woody3_powerpc.deb
gzip (1.3.2-3woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Revert patches for zdiff and znew since the use of 'set -C' should
    indeed be sufficient.


stable/main/binary-mips/gzip_1.3.2-3woody3_mips.deb
gzip (1.3.2-3woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Revert patches for zdiff and znew since the use of 'set -C' should
    indeed be sufficient.


stable/main/binary-m68k/gzip_1.3.2-3woody3_m68k.deb
gzip (1.3.2-3woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Revert patches for zdiff and znew since the use of 'set -C' should
    indeed be sufficient.


stable/main/binary-ia64/gzip_1.3.2-3woody3_ia64.deb
gzip (1.3.2-3woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Revert patches for zdiff and znew since the use of 'set -C' should
    indeed be sufficient.


stable/main/binary-i386/gzip_1.3.2-3woody3_i386.deb
gzip (1.3.2-3woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Revert patches for zdiff and znew since the use of 'set -C' should
    indeed be sufficient.


stable/main/binary-hppa/gzip_1.3.2-3woody3_hppa.deb
gzip (1.3.2-3woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Revert patches for zdiff and znew since the use of 'set -C' should
    indeed be sufficient.


stable/main/binary-arm/gzip_1.3.2-3woody3_arm.deb
gzip (1.3.2-3woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Revert patches for zdiff and znew since the use of 'set -C' should
    indeed be sufficient.


stable/main/binary-alpha/gzip_1.3.2-3woody3_alpha.deb
gzip (1.3.2-3woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Revert patches for zdiff and znew since the use of 'set -C' should
    indeed be sufficient.


stable/main/source/gzip_1.3.2-3woody3.dsc
stable/main/binary-mipsel/gzip_1.3.2-3woody3_mipsel.deb
stable/main/source/gzip_1.3.2-3woody3.diff.gz
gzip (1.3.2-3woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Revert patches for zdiff and znew since the use of 'set -C' should
    indeed be sufficient.


stable/main/binary-sparc/gps_0.9.4-1.woody2_sparc.deb
stable/main/binary-sparc/rgpsp_0.9.4-1.woody2_sparc.deb
gps (0.9.4-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted teh version number so that it is higher than 0.9.4-1woody1
    and 0.49.13-15.0.1 which prevents the inclusion in stable


stable/main/binary-s390/rgpsp_0.9.4-1.woody2_s390.deb
stable/main/binary-s390/gps_0.9.4-1.woody2_s390.deb
gps (0.9.4-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted teh version number so that it is higher than 0.9.4-1woody1
    and 0.49.13-15.0.1 which prevents the inclusion in stable


stable/main/binary-powerpc/rgpsp_0.9.4-1.woody2_powerpc.deb
stable/main/binary-powerpc/gps_0.9.4-1.woody2_powerpc.deb
gps (0.9.4-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted teh version number so that it is higher than 0.9.4-1woody1
    and 0.49.13-15.0.1 which prevents the inclusion in stable


stable/main/binary-mips/rgpsp_0.9.4-1.woody2_mips.deb
stable/main/binary-mips/gps_0.9.4-1.woody2_mips.deb
gps (0.9.4-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted teh version number so that it is higher than 0.9.4-1woody1
    and 0.49.13-15.0.1 which prevents the inclusion in stable


stable/main/binary-m68k/gps_0.9.4-1.woody2_m68k.deb
stable/main/binary-m68k/rgpsp_0.9.4-1.woody2_m68k.deb
gps (0.9.4-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted teh version number so that it is higher than 0.9.4-1woody1
    and 0.49.13-15.0.1 which prevents the inclusion in stable


stable/main/binary-ia64/rgpsp_0.9.4-1.woody2_ia64.deb
stable/main/binary-ia64/gps_0.9.4-1.woody2_ia64.deb
gps (0.9.4-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted teh version number so that it is higher than 0.9.4-1woody1
    and 0.49.13-15.0.1 which prevents the inclusion in stable


stable/main/binary-i386/gps_0.9.4-1.woody2_i386.deb
stable/main/binary-i386/rgpsp_0.9.4-1.woody2_i386.deb
gps (0.9.4-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted teh version number so that it is higher than 0.9.4-1woody1
    and 0.49.13-15.0.1 which prevents the inclusion in stable


stable/main/binary-hppa/rgpsp_0.9.4-1.woody2_hppa.deb
stable/main/binary-hppa/gps_0.9.4-1.woody2_hppa.deb
gps (0.9.4-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted teh version number so that it is higher than 0.9.4-1woody1
    and 0.49.13-15.0.1 which prevents the inclusion in stable


stable/main/binary-arm/rgpsp_0.9.4-1.woody2_arm.deb
stable/main/binary-arm/gps_0.9.4-1.woody2_arm.deb
gps (0.9.4-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted teh version number so that it is higher than 0.9.4-1woody1
    and 0.49.13-15.0.1 which prevents the inclusion in stable


stable/main/binary-alpha/rgpsp_0.9.4-1.woody2_alpha.deb
stable/main/binary-alpha/gps_0.9.4-1.woody2_alpha.deb
gps (0.9.4-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted teh version number so that it is higher than 0.9.4-1woody1
    and 0.49.13-15.0.1 which prevents the inclusion in stable


stable/main/binary-mipsel/rgpsp_0.9.4-1.woody2_mipsel.deb
stable/main/source/gps_0.9.4-1.woody2.diff.gz
stable/main/binary-mipsel/gps_0.9.4-1.woody2_mipsel.deb
stable/main/source/gps_0.9.4-1.woody2.dsc
gps (0.9.4-1.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted teh version number so that it is higher than 0.9.4-1woody1
    and 0.49.13-15.0.1 which prevents the inclusion in stable


stable/main/binary-sparc/gnats_3.999.beta1+cvs20020303-2_sparc.deb
stable/main/binary-sparc/gnats-user_3.999.beta1+cvs20020303-2_sparc.deb
gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high
  * CAN-2004-0623: Fix format string vulnerability in misc.c
    (Related BTS: #278577) Report and patch by Joey Hess.
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-s390/gnats-user_3.999.beta1+cvs20020303-2_s390.deb
stable/main/binary-s390/gnats_3.999.beta1+cvs20020303-2_s390.deb
gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high
  * CAN-2004-0623: Fix format string vulnerability in misc.c
    (Related BTS: #278577) Report and patch by Joey Hess.
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-powerpc/gnats-user_3.999.beta1+cvs20020303-2_powerpc.deb
stable/main/binary-powerpc/gnats_3.999.beta1+cvs20020303-2_powerpc.deb
gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high
  * CAN-2004-0623: Fix format string vulnerability in misc.c
    (Related BTS: #278577) Report and patch by Joey Hess.
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mips/gnats-user_3.999.beta1+cvs20020303-2_mips.deb
stable/main/binary-mips/gnats_3.999.beta1+cvs20020303-2_mips.deb
gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high
  * CAN-2004-0623: Fix format string vulnerability in misc.c
    (Related BTS: #278577) Report and patch by Joey Hess.
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-m68k/gnats_3.999.beta1+cvs20020303-2_m68k.deb
stable/main/binary-m68k/gnats-user_3.999.beta1+cvs20020303-2_m68k.deb
gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high
  * CAN-2004-0623: Fix format string vulnerability in misc.c
    (Related BTS: #278577) Report and patch by Joey Hess.
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-ia64/gnats-user_3.999.beta1+cvs20020303-2_ia64.deb
stable/main/binary-ia64/gnats_3.999.beta1+cvs20020303-2_ia64.deb
gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high
  * CAN-2004-0623: Fix format string vulnerability in misc.c
    (Related BTS: #278577) Report and patch by Joey Hess.
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-i386/gnats_3.999.beta1+cvs20020303-2_i386.deb
stable/main/binary-i386/gnats-user_3.999.beta1+cvs20020303-2_i386.deb
gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high
  * CAN-2004-0623: Fix format string vulnerability in misc.c
    (Related BTS: #278577) Report and patch by Joey Hess.
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-hppa/gnats-user_3.999.beta1+cvs20020303-2_hppa.deb
stable/main/binary-hppa/gnats_3.999.beta1+cvs20020303-2_hppa.deb
gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high
  * CAN-2004-0623: Fix format string vulnerability in misc.c
    (Related BTS: #278577) Report and patch by Joey Hess.
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-arm/gnats-user_3.999.beta1+cvs20020303-2_arm.deb
stable/main/binary-arm/gnats_3.999.beta1+cvs20020303-2_arm.deb
gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high
  * CAN-2004-0623: Fix format string vulnerability in misc.c
    (Related BTS: #278577) Report and patch by Joey Hess.
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-alpha/gnats-user_3.999.beta1+cvs20020303-2_alpha.deb
stable/main/binary-alpha/gnats_3.999.beta1+cvs20020303-2_alpha.deb
gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high
  * CAN-2004-0623: Fix format string vulnerability in misc.c
    (Related BTS: #278577) Report and patch by Joey Hess.
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mipsel/gnats_3.999.beta1+cvs20020303-2_mipsel.deb
stable/main/source/gnats_3.999.beta1+cvs20020303-2.dsc
stable/main/source/gnats_3.999.beta1+cvs20020303-2.tar.gz
stable/main/binary-mipsel/gnats-user_3.999.beta1+cvs20020303-2_mipsel.deb
gnats (3.999.beta1+cvs20020303-2) stable-security; urgency=high
  * CAN-2004-0623: Fix format string vulnerability in misc.c
    (Related BTS: #278577) Report and patch by Joey Hess.
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-sparc/fte-console_0.49.13-15.woody2_sparc.deb
stable/main/binary-sparc/fte-xwindow_0.49.13-15.woody2_sparc.deb
stable/main/binary-sparc/fte-terminal_0.49.13-15.woody2_sparc.deb
stable/main/binary-sparc/fte-docs_0.49.13-15.woody2_sparc.deb
stable/main/binary-sparc/fte_0.49.13-15.woody2_sparc.deb
fte (0.49.13-15.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the version number so that it is higher than 0.49.13-15woody1
    and 0.49.13-15.0.1 [CAN-2003-0648]


stable/main/binary-s390/fte-console_0.49.13-15.woody2_s390.deb
stable/main/binary-s390/fte-xwindow_0.49.13-15.woody2_s390.deb
stable/main/binary-s390/fte-docs_0.49.13-15.woody2_s390.deb
stable/main/binary-s390/fte_0.49.13-15.woody2_s390.deb
stable/main/binary-s390/fte-terminal_0.49.13-15.woody2_s390.deb
fte (0.49.13-15.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the version number so that it is higher than 0.49.13-15woody1
    and 0.49.13-15.0.1 [CAN-2003-0648]


stable/main/binary-powerpc/fte_0.49.13-15.woody2_powerpc.deb
stable/main/binary-powerpc/fte-terminal_0.49.13-15.woody2_powerpc.deb
stable/main/binary-powerpc/fte-console_0.49.13-15.woody2_powerpc.deb
stable/main/binary-powerpc/fte-docs_0.49.13-15.woody2_powerpc.deb
stable/main/binary-powerpc/fte-xwindow_0.49.13-15.woody2_powerpc.deb
fte (0.49.13-15.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the version number so that it is higher than 0.49.13-15woody1
    and 0.49.13-15.0.1 [CAN-2003-0648]


stable/main/binary-mips/fte_0.49.13-15.woody2_mips.deb
stable/main/binary-mips/fte-terminal_0.49.13-15.woody2_mips.deb
stable/main/binary-mips/fte-docs_0.49.13-15.woody2_mips.deb
stable/main/binary-mips/fte-console_0.49.13-15.woody2_mips.deb
stable/main/binary-mips/fte-xwindow_0.49.13-15.woody2_mips.deb
fte (0.49.13-15.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the version number so that it is higher than 0.49.13-15woody1
    and 0.49.13-15.0.1 [CAN-2003-0648]


stable/main/binary-m68k/fte-docs_0.49.13-15.woody2_m68k.deb
stable/main/binary-m68k/fte-terminal_0.49.13-15.woody2_m68k.deb
stable/main/binary-m68k/fte_0.49.13-15.woody2_m68k.deb
stable/main/binary-m68k/fte-xwindow_0.49.13-15.woody2_m68k.deb
stable/main/binary-m68k/fte-console_0.49.13-15.woody2_m68k.deb
fte (0.49.13-15.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the version number so that it is higher than 0.49.13-15woody1
    and 0.49.13-15.0.1 [CAN-2003-0648]


stable/main/binary-ia64/fte-console_0.49.13-15.woody2_ia64.deb
stable/main/binary-ia64/fte-xwindow_0.49.13-15.woody2_ia64.deb
stable/main/binary-ia64/fte_0.49.13-15.woody2_ia64.deb
stable/main/binary-ia64/fte-docs_0.49.13-15.woody2_ia64.deb
stable/main/binary-ia64/fte-terminal_0.49.13-15.woody2_ia64.deb
fte (0.49.13-15.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the version number so that it is higher than 0.49.13-15woody1
    and 0.49.13-15.0.1 [CAN-2003-0648]


stable/main/binary-i386/fte-terminal_0.49.13-15.woody2_i386.deb
stable/main/binary-i386/fte-xwindow_0.49.13-15.woody2_i386.deb
stable/main/binary-i386/fte-console_0.49.13-15.woody2_i386.deb
stable/main/binary-i386/fte-docs_0.49.13-15.woody2_i386.deb
stable/main/binary-i386/fte_0.49.13-15.woody2_i386.deb
fte (0.49.13-15.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the version number so that it is higher than 0.49.13-15woody1
    and 0.49.13-15.0.1 [CAN-2003-0648]


stable/main/binary-hppa/fte-console_0.49.13-15.woody2_hppa.deb
stable/main/binary-hppa/fte-docs_0.49.13-15.woody2_hppa.deb
stable/main/binary-hppa/fte_0.49.13-15.woody2_hppa.deb
stable/main/binary-hppa/fte-xwindow_0.49.13-15.woody2_hppa.deb
stable/main/binary-hppa/fte-terminal_0.49.13-15.woody2_hppa.deb
fte (0.49.13-15.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the version number so that it is higher than 0.49.13-15woody1
    and 0.49.13-15.0.1 [CAN-2003-0648]


stable/main/binary-arm/fte-xwindow_0.49.13-15.woody2_arm.deb
stable/main/binary-arm/fte-console_0.49.13-15.woody2_arm.deb
stable/main/binary-arm/fte-docs_0.49.13-15.woody2_arm.deb
stable/main/binary-arm/fte_0.49.13-15.woody2_arm.deb
stable/main/binary-arm/fte-terminal_0.49.13-15.woody2_arm.deb
fte (0.49.13-15.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the version number so that it is higher than 0.49.13-15woody1
    and 0.49.13-15.0.1 [CAN-2003-0648]


stable/main/binary-alpha/fte-terminal_0.49.13-15.woody2_alpha.deb
stable/main/binary-alpha/fte-console_0.49.13-15.woody2_alpha.deb
stable/main/binary-alpha/fte-xwindow_0.49.13-15.woody2_alpha.deb
stable/main/binary-alpha/fte_0.49.13-15.woody2_alpha.deb
stable/main/binary-alpha/fte-docs_0.49.13-15.woody2_alpha.deb
fte (0.49.13-15.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the version number so that it is higher than 0.49.13-15woody1
    and 0.49.13-15.0.1 [CAN-2003-0648]


stable/main/binary-mipsel/fte-console_0.49.13-15.woody2_mipsel.deb
stable/main/binary-mipsel/fte-terminal_0.49.13-15.woody2_mipsel.deb
stable/main/binary-mipsel/fte-docs_0.49.13-15.woody2_mipsel.deb
stable/main/binary-mipsel/fte-xwindow_0.49.13-15.woody2_mipsel.deb
stable/main/binary-mipsel/fte_0.49.13-15.woody2_mipsel.deb
stable/main/source/fte_0.49.13-15.woody2.dsc
stable/main/source/fte_0.49.13-15.woody2.tar.gz
fte (0.49.13-15.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted the version number so that it is higher than 0.49.13-15woody1
    and 0.49.13-15.0.1 [CAN-2003-0648]


stable/main/binary-sparc/freesweep_0.88-4woody1_sparc.deb
freesweep (0.88-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fixed buffer overflow with environmental variable handling which
    allowed local GID games attack (CAN-2003-0828).


stable/main/binary-s390/freesweep_0.88-4woody1_s390.deb
freesweep (0.88-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fixed buffer overflow with environmental variable handling which
    allowed local GID games attack (CAN-2003-0828).


stable/main/binary-powerpc/freesweep_0.88-4woody1_powerpc.deb
freesweep (0.88-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fixed buffer overflow with environmental variable handling which
    allowed local GID games attack (CAN-2003-0828).


stable/main/binary-mipsel/freesweep_0.88-4woody1_mipsel.deb
freesweep (0.88-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fixed buffer overflow with environmental variable handling which
    allowed local GID games attack (CAN-2003-0828).


stable/main/binary-mips/freesweep_0.88-4woody1_mips.deb
freesweep (0.88-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fixed buffer overflow with environmental variable handling which
    allowed local GID games attack (CAN-2003-0828).


stable/main/binary-m68k/freesweep_0.88-4woody1_m68k.deb
freesweep (0.88-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fixed buffer overflow with environmental variable handling which
    allowed local GID games attack (CAN-2003-0828).


stable/main/binary-ia64/freesweep_0.88-4woody1_ia64.deb
freesweep (0.88-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fixed buffer overflow with environmental variable handling which
    allowed local GID games attack (CAN-2003-0828).


stable/main/binary-hppa/freesweep_0.88-4woody1_hppa.deb
freesweep (0.88-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fixed buffer overflow with environmental variable handling which
    allowed local GID games attack (CAN-2003-0828).


stable/main/binary-arm/freesweep_0.88-4woody1_arm.deb
freesweep (0.88-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fixed buffer overflow with environmental variable handling which
    allowed local GID games attack (CAN-2003-0828).


stable/main/binary-alpha/freesweep_0.88-4woody1_alpha.deb
freesweep (0.88-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fixed buffer overflow with environmental variable handling which
    allowed local GID games attack (CAN-2003-0828).


stable/main/source/freesweep_0.88-4woody1.dsc
stable/main/source/freesweep_0.88-4woody1.diff.gz
stable/main/binary-i386/freesweep_0.88-4woody1_i386.deb
freesweep (0.88-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fixed buffer overflow with environmental variable handling which
    allowed local GID games attack (CAN-2003-0828).


stable/main/binary-sparc/libfreeamp-alsa_2.1.1.0-4woody2_sparc.deb
stable/main/binary-sparc/freeamp-extras_2.1.1.0-4woody2_sparc.deb
stable/main/binary-sparc/libfreeamp-esound_2.1.1.0-4woody2_sparc.deb
stable/main/binary-sparc/freeamp_2.1.1.0-4woody2_sparc.deb
freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added Build-Conflicts against libarts-dev so that the package build
    won't fail anymore if there is a spurious libarts-dev installed by
    accident.


stable/main/binary-s390/freeamp_2.1.1.0-4woody2_s390.deb
stable/main/binary-s390/libfreeamp-esound_2.1.1.0-4woody2_s390.deb
stable/main/binary-s390/freeamp-extras_2.1.1.0-4woody2_s390.deb
freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added Build-Conflicts against libarts-dev so that the package build
    won't fail anymore if there is a spurious libarts-dev installed by
    accident.


stable/main/binary-powerpc/libfreeamp-alsa_2.1.1.0-4woody2_powerpc.deb
stable/main/binary-powerpc/freeamp_2.1.1.0-4woody2_powerpc.deb
stable/main/binary-powerpc/freeamp-extras_2.1.1.0-4woody2_powerpc.deb
stable/main/binary-powerpc/libfreeamp-esound_2.1.1.0-4woody2_powerpc.deb
freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added Build-Conflicts against libarts-dev so that the package build
    won't fail anymore if there is a spurious libarts-dev installed by
    accident.


stable/main/binary-mipsel/libfreeamp-esound_2.1.1.0-4woody2_mipsel.deb
stable/main/binary-mipsel/freeamp-extras_2.1.1.0-4woody2_mipsel.deb
stable/main/binary-mipsel/freeamp_2.1.1.0-4woody2_mipsel.deb
freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added Build-Conflicts against libarts-dev so that the package build
    won't fail anymore if there is a spurious libarts-dev installed by
    accident.


stable/main/binary-mips/freeamp-extras_2.1.1.0-4woody2_mips.deb
stable/main/binary-mips/libfreeamp-esound_2.1.1.0-4woody2_mips.deb
stable/main/binary-mips/freeamp_2.1.1.0-4woody2_mips.deb
stable/main/binary-mips/libfreeamp-alsa_2.1.1.0-4woody2_mips.deb
freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added Build-Conflicts against libarts-dev so that the package build
    won't fail anymore if there is a spurious libarts-dev installed by
    accident.


stable/main/binary-ia64/freeamp_2.1.1.0-4woody2_ia64.deb
stable/main/binary-ia64/freeamp-extras_2.1.1.0-4woody2_ia64.deb
stable/main/binary-ia64/libfreeamp-esound_2.1.1.0-4woody2_ia64.deb
freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added Build-Conflicts against libarts-dev so that the package build
    won't fail anymore if there is a spurious libarts-dev installed by
    accident.


stable/main/binary-i386/libfreeamp-alsa_2.1.1.0-4woody2_i386.deb
stable/main/binary-i386/freeamp_2.1.1.0-4woody2_i386.deb
stable/main/binary-i386/libfreeamp-esound_2.1.1.0-4woody2_i386.deb
stable/main/binary-i386/freeamp-extras_2.1.1.0-4woody2_i386.deb
freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added Build-Conflicts against libarts-dev so that the package build
    won't fail anymore if there is a spurious libarts-dev installed by
    accident.


stable/main/binary-hppa/freeamp_2.1.1.0-4woody2_hppa.deb
stable/main/binary-hppa/freeamp-extras_2.1.1.0-4woody2_hppa.deb
stable/main/binary-hppa/libfreeamp-esound_2.1.1.0-4woody2_hppa.deb
freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added Build-Conflicts against libarts-dev so that the package build
    won't fail anymore if there is a spurious libarts-dev installed by
    accident.


stable/main/binary-arm/libfreeamp-esound_2.1.1.0-4woody2_arm.deb
stable/main/binary-arm/freeamp_2.1.1.0-4woody2_arm.deb
stable/main/binary-arm/freeamp-extras_2.1.1.0-4woody2_arm.deb
stable/main/binary-arm/libfreeamp-alsa_2.1.1.0-4woody2_arm.deb
freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added Build-Conflicts against libarts-dev so that the package build
    won't fail anymore if there is a spurious libarts-dev installed by
    accident.


stable/main/binary-alpha/freeamp_2.1.1.0-4woody2_alpha.deb
stable/main/binary-alpha/freeamp-extras_2.1.1.0-4woody2_alpha.deb
stable/main/binary-alpha/libfreeamp-esound_2.1.1.0-4woody2_alpha.deb
stable/main/binary-alpha/libfreeamp-alsa_2.1.1.0-4woody2_alpha.deb
freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added Build-Conflicts against libarts-dev so that the package build
    won't fail anymore if there is a spurious libarts-dev installed by
    accident.


stable/main/binary-m68k/libfreeamp-esound_2.1.1.0-4woody2_m68k.deb
stable/main/binary-m68k/freeamp-extras_2.1.1.0-4woody2_m68k.deb
stable/main/source/freeamp_2.1.1.0-4woody2.diff.gz
stable/main/binary-all/freeamp-doc_2.1.1.0-4woody2_all.deb
stable/main/source/freeamp_2.1.1.0-4woody2.dsc
stable/main/binary-m68k/freeamp_2.1.1.0-4woody2_m68k.deb
freeamp (1:2.1.1.0-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added Build-Conflicts against libarts-dev so that the package build
    won't fail anymore if there is a spurious libarts-dev installed by
    accident.


stable/main/binary-sparc/ez-ipupdate_3.0.11b5-1woody2_sparc.deb
ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [ez-ipupdate.c, CAN-2004-0980]


stable/main/binary-s390/ez-ipupdate_3.0.11b5-1woody2_s390.deb
ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [ez-ipupdate.c, CAN-2004-0980]


stable/main/binary-powerpc/ez-ipupdate_3.0.11b5-1woody2_powerpc.deb
ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [ez-ipupdate.c, CAN-2004-0980]


stable/main/binary-mips/ez-ipupdate_3.0.11b5-1woody2_mips.deb
ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [ez-ipupdate.c, CAN-2004-0980]


stable/main/binary-m68k/ez-ipupdate_3.0.11b5-1woody2_m68k.deb
ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [ez-ipupdate.c, CAN-2004-0980]


stable/main/binary-ia64/ez-ipupdate_3.0.11b5-1woody2_ia64.deb
ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [ez-ipupdate.c, CAN-2004-0980]


stable/main/binary-i386/ez-ipupdate_3.0.11b5-1woody2_i386.deb
ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [ez-ipupdate.c, CAN-2004-0980]


stable/main/binary-hppa/ez-ipupdate_3.0.11b5-1woody2_hppa.deb
ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [ez-ipupdate.c, CAN-2004-0980]


stable/main/binary-arm/ez-ipupdate_3.0.11b5-1woody2_arm.deb
ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [ez-ipupdate.c, CAN-2004-0980]


stable/main/binary-alpha/ez-ipupdate_3.0.11b5-1woody2_alpha.deb
ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [ez-ipupdate.c, CAN-2004-0980]


stable/main/source/ez-ipupdate_3.0.11b5-1woody2.diff.gz
stable/main/binary-mipsel/ez-ipupdate_3.0.11b5-1woody2_mipsel.deb
stable/main/source/ez-ipupdate_3.0.11b5-1woody2.dsc
ez-ipupdate (3.0.11b5-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Ulf Härnhammar to fix format string vulnerability
    [ez-ipupdate.c, CAN-2004-0980]


stable/main/binary-sparc/tethereal_0.9.4-1woody9_sparc.deb
stable/main/binary-sparc/ethereal-dev_0.9.4-1woody9_sparc.deb
stable/main/binary-sparc/ethereal-common_0.9.4-1woody9_sparc.deb
stable/main/binary-sparc/ethereal_0.9.4-1woody9_sparc.deb
ethereal (0.9.4-1woody9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SMB dissector
    (CAN-2004-1142)


stable/main/binary-s390/ethereal-dev_0.9.4-1woody9_s390.deb
stable/main/binary-s390/tethereal_0.9.4-1woody9_s390.deb
stable/main/binary-s390/ethereal_0.9.4-1woody9_s390.deb
stable/main/binary-s390/ethereal-common_0.9.4-1woody9_s390.deb
ethereal (0.9.4-1woody9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SMB dissector
    (CAN-2004-1142)


stable/main/binary-powerpc/ethereal-common_0.9.4-1woody9_powerpc.deb
stable/main/binary-powerpc/ethereal-dev_0.9.4-1woody9_powerpc.deb
stable/main/binary-powerpc/ethereal_0.9.4-1woody9_powerpc.deb
stable/main/binary-powerpc/tethereal_0.9.4-1woody9_powerpc.deb
ethereal (0.9.4-1woody9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SMB dissector
    (CAN-2004-1142)


stable/main/binary-mipsel/ethereal-common_0.9.4-1woody9_mipsel.deb
stable/main/binary-mipsel/ethereal_0.9.4-1woody9_mipsel.deb
stable/main/binary-mipsel/tethereal_0.9.4-1woody9_mipsel.deb
stable/main/binary-mipsel/ethereal-dev_0.9.4-1woody9_mipsel.deb
ethereal (0.9.4-1woody9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SMB dissector
    (CAN-2004-1142)


stable/main/binary-mips/ethereal-common_0.9.4-1woody9_mips.deb
stable/main/binary-mips/ethereal-dev_0.9.4-1woody9_mips.deb
stable/main/binary-mips/tethereal_0.9.4-1woody9_mips.deb
stable/main/binary-mips/ethereal_0.9.4-1woody9_mips.deb
ethereal (0.9.4-1woody9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SMB dissector
    (CAN-2004-1142)


stable/main/binary-m68k/ethereal-common_0.9.4-1woody9_m68k.deb
stable/main/binary-m68k/ethereal_0.9.4-1woody9_m68k.deb
stable/main/binary-m68k/tethereal_0.9.4-1woody9_m68k.deb
stable/main/binary-m68k/ethereal-dev_0.9.4-1woody9_m68k.deb
ethereal (0.9.4-1woody9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SMB dissector
    (CAN-2004-1142)


stable/main/binary-ia64/ethereal-common_0.9.4-1woody9_ia64.deb
stable/main/binary-ia64/tethereal_0.9.4-1woody9_ia64.deb
stable/main/binary-ia64/ethereal-dev_0.9.4-1woody9_ia64.deb
stable/main/binary-ia64/ethereal_0.9.4-1woody9_ia64.deb
ethereal (0.9.4-1woody9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SMB dissector
    (CAN-2004-1142)


stable/main/binary-hppa/tethereal_0.9.4-1woody9_hppa.deb
stable/main/binary-hppa/ethereal_0.9.4-1woody9_hppa.deb
stable/main/binary-hppa/ethereal-dev_0.9.4-1woody9_hppa.deb
stable/main/binary-hppa/ethereal-common_0.9.4-1woody9_hppa.deb
ethereal (0.9.4-1woody9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SMB dissector
    (CAN-2004-1142)


stable/main/binary-arm/ethereal_0.9.4-1woody9_arm.deb
stable/main/binary-arm/ethereal-dev_0.9.4-1woody9_arm.deb
stable/main/binary-arm/tethereal_0.9.4-1woody9_arm.deb
stable/main/binary-arm/ethereal-common_0.9.4-1woody9_arm.deb
ethereal (0.9.4-1woody9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SMB dissector
    (CAN-2004-1142)


stable/main/binary-alpha/ethereal_0.9.4-1woody9_alpha.deb
stable/main/binary-alpha/ethereal-common_0.9.4-1woody9_alpha.deb
stable/main/binary-alpha/ethereal-dev_0.9.4-1woody9_alpha.deb
stable/main/binary-alpha/tethereal_0.9.4-1woody9_alpha.deb
ethereal (0.9.4-1woody9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SMB dissector
    (CAN-2004-1142)


stable/main/binary-i386/tethereal_0.9.4-1woody9_i386.deb
stable/main/binary-i386/ethereal-dev_0.9.4-1woody9_i386.deb
stable/main/source/ethereal_0.9.4-1woody9.dsc
stable/main/binary-i386/ethereal_0.9.4-1woody9_i386.deb
stable/main/binary-i386/ethereal-common_0.9.4-1woody9_i386.deb
stable/main/source/ethereal_0.9.4-1woody9.diff.gz
ethereal (0.9.4-1woody9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SMB dissector
    (CAN-2004-1142)


stable/main/binary-sparc/dhcp-client-udeb_2.0pl5-11woody1_sparc.udeb
stable/main/binary-sparc/dhcp-client_2.0pl5-11woody1_sparc.deb
stable/main/binary-sparc/dhcp_2.0pl5-11woody1_sparc.deb
stable/main/binary-sparc/dhcp-relay_2.0pl5-11woody1_sparc.deb
dhcp (2.0pl5-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected calls to syslog() in order to prevent a remotely triggerable
    buffer overflow [common/errwarn.c, CAN-2004-1006]


stable/main/binary-s390/dhcp_2.0pl5-11woody1_s390.deb
stable/main/binary-s390/dhcp-client-udeb_2.0pl5-11woody1_s390.udeb
stable/main/binary-s390/dhcp-relay_2.0pl5-11woody1_s390.deb
stable/main/binary-s390/dhcp-client_2.0pl5-11woody1_s390.deb
dhcp (2.0pl5-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected calls to syslog() in order to prevent a remotely triggerable
    buffer overflow [common/errwarn.c, CAN-2004-1006]


stable/main/binary-powerpc/dhcp_2.0pl5-11woody1_powerpc.deb
stable/main/binary-powerpc/dhcp-client-udeb_2.0pl5-11woody1_powerpc.udeb
stable/main/binary-powerpc/dhcp-client_2.0pl5-11woody1_powerpc.deb
stable/main/binary-powerpc/dhcp-relay_2.0pl5-11woody1_powerpc.deb
dhcp (2.0pl5-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected calls to syslog() in order to prevent a remotely triggerable
    buffer overflow [common/errwarn.c, CAN-2004-1006]


stable/main/binary-mips/dhcp_2.0pl5-11woody1_mips.deb
stable/main/binary-mips/dhcp-client-udeb_2.0pl5-11woody1_mips.udeb
stable/main/binary-mips/dhcp-client_2.0pl5-11woody1_mips.deb
stable/main/binary-mips/dhcp-relay_2.0pl5-11woody1_mips.deb
dhcp (2.0pl5-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected calls to syslog() in order to prevent a remotely triggerable
    buffer overflow [common/errwarn.c, CAN-2004-1006]


stable/main/binary-m68k/dhcp-client_2.0pl5-11woody1_m68k.deb
stable/main/binary-m68k/dhcp_2.0pl5-11woody1_m68k.deb
stable/main/binary-m68k/dhcp-client-udeb_2.0pl5-11woody1_m68k.udeb
stable/main/binary-m68k/dhcp-relay_2.0pl5-11woody1_m68k.deb
dhcp (2.0pl5-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected calls to syslog() in order to prevent a remotely triggerable
    buffer overflow [common/errwarn.c, CAN-2004-1006]


stable/main/binary-ia64/dhcp_2.0pl5-11woody1_ia64.deb
stable/main/binary-ia64/dhcp-client_2.0pl5-11woody1_ia64.deb
stable/main/binary-ia64/dhcp-client-udeb_2.0pl5-11woody1_ia64.udeb
stable/main/binary-ia64/dhcp-relay_2.0pl5-11woody1_ia64.deb
dhcp (2.0pl5-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected calls to syslog() in order to prevent a remotely triggerable
    buffer overflow [common/errwarn.c, CAN-2004-1006]


stable/main/binary-i386/dhcp-client-udeb_2.0pl5-11woody1_i386.udeb
stable/main/binary-i386/dhcp-relay_2.0pl5-11woody1_i386.deb
stable/main/binary-i386/dhcp-client_2.0pl5-11woody1_i386.deb
stable/main/binary-i386/dhcp_2.0pl5-11woody1_i386.deb
dhcp (2.0pl5-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected calls to syslog() in order to prevent a remotely triggerable
    buffer overflow [common/errwarn.c, CAN-2004-1006]


stable/main/binary-hppa/dhcp-client-udeb_2.0pl5-11woody1_hppa.udeb
stable/main/binary-hppa/dhcp-relay_2.0pl5-11woody1_hppa.deb
stable/main/binary-hppa/dhcp-client_2.0pl5-11woody1_hppa.deb
stable/main/binary-hppa/dhcp_2.0pl5-11woody1_hppa.deb
dhcp (2.0pl5-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected calls to syslog() in order to prevent a remotely triggerable
    buffer overflow [common/errwarn.c, CAN-2004-1006]


stable/main/binary-arm/dhcp-relay_2.0pl5-11woody1_arm.deb
stable/main/binary-arm/dhcp-client-udeb_2.0pl5-11woody1_arm.udeb
stable/main/binary-arm/dhcp-client_2.0pl5-11woody1_arm.deb
stable/main/binary-arm/dhcp_2.0pl5-11woody1_arm.deb
dhcp (2.0pl5-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected calls to syslog() in order to prevent a remotely triggerable
    buffer overflow [common/errwarn.c, CAN-2004-1006]


stable/main/binary-alpha/dhcp-relay_2.0pl5-11woody1_alpha.deb
stable/main/binary-alpha/dhcp_2.0pl5-11woody1_alpha.deb
stable/main/binary-alpha/dhcp-client_2.0pl5-11woody1_alpha.deb
stable/main/binary-alpha/dhcp-client-udeb_2.0pl5-11woody1_alpha.udeb
dhcp (2.0pl5-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected calls to syslog() in order to prevent a remotely triggerable
    buffer overflow [common/errwarn.c, CAN-2004-1006]


stable/main/binary-mipsel/dhcp-relay_2.0pl5-11woody1_mipsel.deb
stable/main/binary-mipsel/dhcp-client_2.0pl5-11woody1_mipsel.deb
stable/main/source/dhcp_2.0pl5-11woody1.dsc
stable/main/source/dhcp_2.0pl5-11woody1.diff.gz
stable/main/binary-mipsel/dhcp_2.0pl5-11woody1_mipsel.deb
stable/main/binary-mipsel/dhcp-client-udeb_2.0pl5-11woody1_mipsel.udeb
dhcp (2.0pl5-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected calls to syslog() in order to prevent a remotely triggerable
    buffer overflow [common/errwarn.c, CAN-2004-1006]


stable/main/source/debmake_3.6.10.woody.1.dsc
stable/main/binary-all/debmake_3.6.10.woody.1_all.deb
stable/main/source/debmake_3.6.10.woody.1.tar.gz
debmake (3.6.10.woody.1) stable-security; urgency=medium
  * Fixed insecure temporary directory usage in debstd (Bug #286382).
    Applied fix from debmake_3.7.7.


stable/main/binary-sparc/cyrus-imapd_1.5.19-9.2_sparc.deb
stable/main/binary-sparc/cyrus-common_1.5.19-9.2_sparc.deb
stable/main/binary-sparc/cyrus-pop3d_1.5.19-9.2_sparc.deb
stable/main/binary-sparc/cyrus-dev_1.5.19-9.2_sparc.deb
stable/main/binary-sparc/cyrus-admin_1.5.19-9.2_sparc.deb
stable/main/binary-sparc/cyrus-nntp_1.5.19-9.2_sparc.deb
cyrus-imapd (1.5.19-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch from Sebastian Krahmer to prevent buffer
    overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013]


stable/main/binary-s390/cyrus-admin_1.5.19-9.2_s390.deb
stable/main/binary-s390/cyrus-dev_1.5.19-9.2_s390.deb
stable/main/binary-s390/cyrus-common_1.5.19-9.2_s390.deb
stable/main/binary-s390/cyrus-pop3d_1.5.19-9.2_s390.deb
stable/main/binary-s390/cyrus-imapd_1.5.19-9.2_s390.deb
stable/main/binary-s390/cyrus-nntp_1.5.19-9.2_s390.deb
cyrus-imapd (1.5.19-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch from Sebastian Krahmer to prevent buffer
    overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013]


stable/main/binary-powerpc/cyrus-imapd_1.5.19-9.2_powerpc.deb
stable/main/binary-powerpc/cyrus-common_1.5.19-9.2_powerpc.deb
stable/main/binary-powerpc/cyrus-dev_1.5.19-9.2_powerpc.deb
stable/main/binary-powerpc/cyrus-pop3d_1.5.19-9.2_powerpc.deb
stable/main/binary-powerpc/cyrus-nntp_1.5.19-9.2_powerpc.deb
stable/main/binary-powerpc/cyrus-admin_1.5.19-9.2_powerpc.deb
cyrus-imapd (1.5.19-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch from Sebastian Krahmer to prevent buffer
    overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013]


stable/main/binary-mips/cyrus-imapd_1.5.19-9.2_mips.deb
stable/main/binary-mips/cyrus-common_1.5.19-9.2_mips.deb
stable/main/binary-mips/cyrus-admin_1.5.19-9.2_mips.deb
stable/main/binary-mips/cyrus-pop3d_1.5.19-9.2_mips.deb
stable/main/binary-mips/cyrus-nntp_1.5.19-9.2_mips.deb
stable/main/binary-mips/cyrus-dev_1.5.19-9.2_mips.deb
cyrus-imapd (1.5.19-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch from Sebastian Krahmer to prevent buffer
    overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013]


stable/main/binary-m68k/cyrus-common_1.5.19-9.2_m68k.deb
stable/main/binary-m68k/cyrus-imapd_1.5.19-9.2_m68k.deb
stable/main/binary-m68k/cyrus-nntp_1.5.19-9.2_m68k.deb
stable/main/binary-m68k/cyrus-admin_1.5.19-9.2_m68k.deb
stable/main/binary-m68k/cyrus-dev_1.5.19-9.2_m68k.deb
stable/main/binary-m68k/cyrus-pop3d_1.5.19-9.2_m68k.deb
cyrus-imapd (1.5.19-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch from Sebastian Krahmer to prevent buffer
    overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013]


stable/main/binary-ia64/cyrus-common_1.5.19-9.2_ia64.deb
stable/main/binary-ia64/cyrus-nntp_1.5.19-9.2_ia64.deb
stable/main/binary-ia64/cyrus-admin_1.5.19-9.2_ia64.deb
stable/main/binary-ia64/cyrus-pop3d_1.5.19-9.2_ia64.deb
stable/main/binary-ia64/cyrus-imapd_1.5.19-9.2_ia64.deb
stable/main/binary-ia64/cyrus-dev_1.5.19-9.2_ia64.deb
cyrus-imapd (1.5.19-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch from Sebastian Krahmer to prevent buffer
    overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013]


stable/main/binary-i386/cyrus-dev_1.5.19-9.2_i386.deb
stable/main/binary-i386/cyrus-pop3d_1.5.19-9.2_i386.deb
stable/main/binary-i386/cyrus-imapd_1.5.19-9.2_i386.deb
stable/main/binary-i386/cyrus-nntp_1.5.19-9.2_i386.deb
stable/main/binary-i386/cyrus-admin_1.5.19-9.2_i386.deb
stable/main/binary-i386/cyrus-common_1.5.19-9.2_i386.deb
cyrus-imapd (1.5.19-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch from Sebastian Krahmer to prevent buffer
    overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013]


stable/main/binary-hppa/cyrus-nntp_1.5.19-9.2_hppa.deb
stable/main/binary-hppa/cyrus-dev_1.5.19-9.2_hppa.deb
stable/main/binary-hppa/cyrus-pop3d_1.5.19-9.2_hppa.deb
stable/main/binary-hppa/cyrus-common_1.5.19-9.2_hppa.deb
stable/main/binary-hppa/cyrus-admin_1.5.19-9.2_hppa.deb
stable/main/binary-hppa/cyrus-imapd_1.5.19-9.2_hppa.deb
cyrus-imapd (1.5.19-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch from Sebastian Krahmer to prevent buffer
    overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013]


stable/main/binary-arm/cyrus-dev_1.5.19-9.2_arm.deb
stable/main/binary-arm/cyrus-pop3d_1.5.19-9.2_arm.deb
stable/main/binary-arm/cyrus-common_1.5.19-9.2_arm.deb
stable/main/binary-arm/cyrus-nntp_1.5.19-9.2_arm.deb
stable/main/binary-arm/cyrus-admin_1.5.19-9.2_arm.deb
stable/main/binary-arm/cyrus-imapd_1.5.19-9.2_arm.deb
cyrus-imapd (1.5.19-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch from Sebastian Krahmer to prevent buffer
    overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013]


stable/main/binary-alpha/cyrus-admin_1.5.19-9.2_alpha.deb
stable/main/binary-alpha/cyrus-dev_1.5.19-9.2_alpha.deb
stable/main/binary-alpha/cyrus-imapd_1.5.19-9.2_alpha.deb
stable/main/binary-alpha/cyrus-common_1.5.19-9.2_alpha.deb
stable/main/binary-alpha/cyrus-nntp_1.5.19-9.2_alpha.deb
stable/main/binary-alpha/cyrus-pop3d_1.5.19-9.2_alpha.deb
cyrus-imapd (1.5.19-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch from Sebastian Krahmer to prevent buffer
    overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013]


stable/main/binary-mipsel/cyrus-dev_1.5.19-9.2_mipsel.deb
stable/main/source/cyrus-imapd_1.5.19-9.2.diff.gz
stable/main/binary-mipsel/cyrus-admin_1.5.19-9.2_mipsel.deb
stable/main/binary-mipsel/cyrus-nntp_1.5.19-9.2_mipsel.deb
stable/main/binary-mipsel/cyrus-pop3d_1.5.19-9.2_mipsel.deb
stable/main/source/cyrus-imapd_1.5.19-9.2.dsc
stable/main/binary-mipsel/cyrus-common_1.5.19-9.2_mipsel.deb
stable/main/binary-mipsel/cyrus-imapd_1.5.19-9.2_mipsel.deb
cyrus-imapd (1.5.19-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Partially applied patch from Sebastian Krahmer to prevent buffer
    overflow [imap/imapd.c, CAN-2004-1012, CAN-2004-1013]


stable/main/binary-sparc/cscope_15.3-1woody2_sparc.deb
cscope (15.3-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary
    file creation [src/main.c, CAN-2004-0996]


stable/main/binary-s390/cscope_15.3-1woody2_s390.deb
cscope (15.3-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary
    file creation [src/main.c, CAN-2004-0996]


stable/main/binary-powerpc/cscope_15.3-1woody2_powerpc.deb
cscope (15.3-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary
    file creation [src/main.c, CAN-2004-0996]


stable/main/binary-mips/cscope_15.3-1woody2_mips.deb
cscope (15.3-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary
    file creation [src/main.c, CAN-2004-0996]


stable/main/binary-m68k/cscope_15.3-1woody2_m68k.deb
cscope (15.3-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary
    file creation [src/main.c, CAN-2004-0996]


stable/main/binary-ia64/cscope_15.3-1woody2_ia64.deb
cscope (15.3-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary
    file creation [src/main.c, CAN-2004-0996]


stable/main/binary-i386/cscope_15.3-1woody2_i386.deb
cscope (15.3-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary
    file creation [src/main.c, CAN-2004-0996]


stable/main/binary-hppa/cscope_15.3-1woody2_hppa.deb
cscope (15.3-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary
    file creation [src/main.c, CAN-2004-0996]


stable/main/binary-arm/cscope_15.3-1woody2_arm.deb
cscope (15.3-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary
    file creation [src/main.c, CAN-2004-0996]


stable/main/binary-alpha/cscope_15.3-1woody2_alpha.deb
cscope (15.3-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary
    file creation [src/main.c, CAN-2004-0996]


stable/main/binary-mipsel/cscope_15.3-1woody2_mipsel.deb
stable/main/source/cscope_15.3-1woody2.dsc
stable/main/source/cscope_15.3-1woody2.diff.gz
cscope (15.3-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied adjusted patch by Gerardo Di Giacomo to fix insecure temporary
    file creation [src/main.c, CAN-2004-0996]


stable/main/binary-sparc/catdoc_0.91.5-1.woody3_sparc.deb
catdoc (0.91.5-1.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rebuilt to contain a version number higher than 0.91.5-1woody1 and
    0.91.5-1.99woody.1 which prevents the security update to be accepted.
  * Fix msxlsview to create its temporary file securely using tempfile(1)
    [src/msxlsview.sh, CAN-2003-0193]
  * Adjusted dependency to wish to tk8.2 so that there is only a single
    package to depend on.


stable/main/binary-s390/catdoc_0.91.5-1.woody3_s390.deb
catdoc (0.91.5-1.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rebuilt to contain a version number higher than 0.91.5-1woody1 and
    0.91.5-1.99woody.1 which prevents the security update to be accepted.
  * Fix msxlsview to create its temporary file securely using tempfile(1)
    [src/msxlsview.sh, CAN-2003-0193]
  * Adjusted dependency to wish to tk8.2 so that there is only a single
    package to depend on.


stable/main/binary-powerpc/catdoc_0.91.5-1.woody3_powerpc.deb
catdoc (0.91.5-1.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rebuilt to contain a version number higher than 0.91.5-1woody1 and
    0.91.5-1.99woody.1 which prevents the security update to be accepted.
  * Fix msxlsview to create its temporary file securely using tempfile(1)
    [src/msxlsview.sh, CAN-2003-0193]
  * Adjusted dependency to wish to tk8.2 so that there is only a single
    package to depend on.


stable/main/binary-mips/catdoc_0.91.5-1.woody3_mips.deb
catdoc (0.91.5-1.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rebuilt to contain a version number higher than 0.91.5-1woody1 and
    0.91.5-1.99woody.1 which prevents the security update to be accepted.
  * Fix msxlsview to create its temporary file securely using tempfile(1)
    [src/msxlsview.sh, CAN-2003-0193]
  * Adjusted dependency to wish to tk8.2 so that there is only a single
    package to depend on.


stable/main/binary-m68k/catdoc_0.91.5-1.woody3_m68k.deb
catdoc (0.91.5-1.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rebuilt to contain a version number higher than 0.91.5-1woody1 and
    0.91.5-1.99woody.1 which prevents the security update to be accepted.
  * Fix msxlsview to create its temporary file securely using tempfile(1)
    [src/msxlsview.sh, CAN-2003-0193]
  * Adjusted dependency to wish to tk8.2 so that there is only a single
    package to depend on.


stable/main/binary-ia64/catdoc_0.91.5-1.woody3_ia64.deb
catdoc (0.91.5-1.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rebuilt to contain a version number higher than 0.91.5-1woody1 and
    0.91.5-1.99woody.1 which prevents the security update to be accepted.
  * Fix msxlsview to create its temporary file securely using tempfile(1)
    [src/msxlsview.sh, CAN-2003-0193]
  * Adjusted dependency to wish to tk8.2 so that there is only a single
    package to depend on.


stable/main/binary-i386/catdoc_0.91.5-1.woody3_i386.deb
catdoc (0.91.5-1.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rebuilt to contain a version number higher than 0.91.5-1woody1 and
    0.91.5-1.99woody.1 which prevents the security update to be accepted.
  * Fix msxlsview to create its temporary file securely using tempfile(1)
    [src/msxlsview.sh, CAN-2003-0193]
  * Adjusted dependency to wish to tk8.2 so that there is only a single
    package to depend on.


stable/main/binary-hppa/catdoc_0.91.5-1.woody3_hppa.deb
catdoc (0.91.5-1.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rebuilt to contain a version number higher than 0.91.5-1woody1 and
    0.91.5-1.99woody.1 which prevents the security update to be accepted.
  * Fix msxlsview to create its temporary file securely using tempfile(1)
    [src/msxlsview.sh, CAN-2003-0193]
  * Adjusted dependency to wish to tk8.2 so that there is only a single
    package to depend on.


stable/main/binary-alpha/catdoc_0.91.5-1.woody3_alpha.deb
catdoc (0.91.5-1.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rebuilt to contain a version number higher than 0.91.5-1woody1 and
    0.91.5-1.99woody.1 which prevents the security update to be accepted.
  * Fix msxlsview to create its temporary file securely using tempfile(1)
    [src/msxlsview.sh, CAN-2003-0193]
  * Adjusted dependency to wish to tk8.2 so that there is only a single
    package to depend on.


stable/main/source/catdoc_0.91.5-1.woody3.diff.gz
stable/main/source/catdoc_0.91.5-1.woody3.dsc
stable/main/binary-mipsel/catdoc_0.91.5-1.woody3_mipsel.deb
catdoc (0.91.5-1.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rebuilt to contain a version number higher than 0.91.5-1woody1 and
    0.91.5-1.99woody.1 which prevents the security update to be accepted.
  * Fix msxlsview to create its temporary file securely using tempfile(1)
    [src/msxlsview.sh, CAN-2003-0193]
  * Adjusted dependency to wish to tk8.2 so that there is only a single
    package to depend on.


stable/main/binary-sparc/cabextract_0.2-2b_sparc.deb
cabextract (0.2-2b) stable-security; urgency=high
  * Fix unintended directory traversal security bug [cabextract.c,
    CAN-2004-0916, Bug#277522]


stable/main/binary-s390/cabextract_0.2-2b_s390.deb
cabextract (0.2-2b) stable-security; urgency=high
  * Fix unintended directory traversal security bug [cabextract.c,
    CAN-2004-0916, Bug#277522]


stable/main/binary-powerpc/cabextract_0.2-2b_powerpc.deb
cabextract (0.2-2b) stable-security; urgency=high
  * Fix unintended directory traversal security bug [cabextract.c,
    CAN-2004-0916, Bug#277522]


stable/main/binary-mipsel/cabextract_0.2-2b_mipsel.deb
cabextract (0.2-2b) stable-security; urgency=high
  * Fix unintended directory traversal security bug [cabextract.c,
    CAN-2004-0916, Bug#277522]


stable/main/binary-mips/cabextract_0.2-2b_mips.deb
cabextract (0.2-2b) stable-security; urgency=high
  * Fix unintended directory traversal security bug [cabextract.c,
    CAN-2004-0916, Bug#277522]


stable/main/binary-m68k/cabextract_0.2-2b_m68k.deb
cabextract (0.2-2b) stable-security; urgency=high
  * Fix unintended directory traversal security bug [cabextract.c,
    CAN-2004-0916, Bug#277522]


stable/main/binary-ia64/cabextract_0.2-2b_ia64.deb
cabextract (0.2-2b) stable-security; urgency=high
  * Fix unintended directory traversal security bug [cabextract.c,
    CAN-2004-0916, Bug#277522]


stable/main/binary-hppa/cabextract_0.2-2b_hppa.deb
cabextract (0.2-2b) stable-security; urgency=high
  * Fix unintended directory traversal security bug [cabextract.c,
    CAN-2004-0916, Bug#277522]


stable/main/binary-arm/cabextract_0.2-2b_arm.deb
cabextract (0.2-2b) stable-security; urgency=high
  * Fix unintended directory traversal security bug [cabextract.c,
    CAN-2004-0916, Bug#277522]


stable/main/binary-alpha/cabextract_0.2-2b_alpha.deb
cabextract (0.2-2b) stable-security; urgency=high
  * Fix unintended directory traversal security bug [cabextract.c,
    CAN-2004-0916, Bug#277522]


stable/main/source/cabextract_0.2-2b.dsc
stable/main/binary-i386/cabextract_0.2-2b_i386.deb
stable/main/source/cabextract_0.2-2b.diff.gz
cabextract (0.2-2b) stable-security; urgency=high
  * Fix unintended directory traversal security bug [cabextract.c,
    CAN-2004-0916, Bug#277522]


stable/main/binary-sparc/bnc_2.6.4-3.3_sparc.deb
bnc (2.6.4-3.3) stable-security; urgency=high
  * Non-maintainer Upload by the Security Team
  * Added debhelper as build-dependency so the package can be built by our
    buildd network.
  * Incorporated size test for getnickuserhost() to prevent a remote
    buffer overflow [cmds.c, CAN-2004-1052]


stable/main/binary-s390/bnc_2.6.4-3.3_s390.deb
bnc (2.6.4-3.3) stable-security; urgency=high
  * Non-maintainer Upload by the Security Team
  * Added debhelper as build-dependency so the package can be built by our
    buildd network.
  * Incorporated size test for getnickuserhost() to prevent a remote
    buffer overflow [cmds.c, CAN-2004-1052]


stable/main/binary-powerpc/bnc_2.6.4-3.3_powerpc.deb
bnc (2.6.4-3.3) stable-security; urgency=high
  * Non-maintainer Upload by the Security Team
  * Added debhelper as build-dependency so the package can be built by our
    buildd network.
  * Incorporated size test for getnickuserhost() to prevent a remote
    buffer overflow [cmds.c, CAN-2004-1052]


stable/main/binary-mips/bnc_2.6.4-3.3_mips.deb
bnc (2.6.4-3.3) stable-security; urgency=high
  * Non-maintainer Upload by the Security Team
  * Added debhelper as build-dependency so the package can be built by our
    buildd network.
  * Incorporated size test for getnickuserhost() to prevent a remote
    buffer overflow [cmds.c, CAN-2004-1052]


stable/main/binary-m68k/bnc_2.6.4-3.3_m68k.deb
bnc (2.6.4-3.3) stable-security; urgency=high
  * Non-maintainer Upload by the Security Team
  * Added debhelper as build-dependency so the package can be built by our
    buildd network.
  * Incorporated size test for getnickuserhost() to prevent a remote
    buffer overflow [cmds.c, CAN-2004-1052]


stable/main/binary-ia64/bnc_2.6.4-3.3_ia64.deb
bnc (2.6.4-3.3) stable-security; urgency=high
  * Non-maintainer Upload by the Security Team
  * Added debhelper as build-dependency so the package can be built by our
    buildd network.
  * Incorporated size test for getnickuserhost() to prevent a remote
    buffer overflow [cmds.c, CAN-2004-1052]


stable/main/binary-i386/bnc_2.6.4-3.3_i386.deb
bnc (2.6.4-3.3) stable-security; urgency=high
  * Non-maintainer Upload by the Security Team
  * Added debhelper as build-dependency so the package can be built by our
    buildd network.
  * Incorporated size test for getnickuserhost() to prevent a remote
    buffer overflow [cmds.c, CAN-2004-1052]


stable/main/binary-hppa/bnc_2.6.4-3.3_hppa.deb
bnc (2.6.4-3.3) stable-security; urgency=high
  * Non-maintainer Upload by the Security Team
  * Added debhelper as build-dependency so the package can be built by our
    buildd network.
  * Incorporated size test for getnickuserhost() to prevent a remote
    buffer overflow [cmds.c, CAN-2004-1052]


stable/main/binary-arm/bnc_2.6.4-3.3_arm.deb
bnc (2.6.4-3.3) stable-security; urgency=high
  * Non-maintainer Upload by the Security Team
  * Added debhelper as build-dependency so the package can be built by our
    buildd network.
  * Incorporated size test for getnickuserhost() to prevent a remote
    buffer overflow [cmds.c, CAN-2004-1052]


stable/main/binary-alpha/bnc_2.6.4-3.3_alpha.deb
bnc (2.6.4-3.3) stable-security; urgency=high
  * Non-maintainer Upload by the Security Team
  * Added debhelper as build-dependency so the package can be built by our
    buildd network.
  * Incorporated size test for getnickuserhost() to prevent a remote
    buffer overflow [cmds.c, CAN-2004-1052]


stable/main/source/bnc_2.6.4-3.3.diff.gz
stable/main/binary-mipsel/bnc_2.6.4-3.3_mipsel.deb
stable/main/source/bnc_2.6.4-3.3.dsc
bnc (2.6.4-3.3) stable-security; urgency=high
  * Non-maintainer Upload by the Security Team
  * Added debhelper as build-dependency so the package can be built by our
    buildd network.
  * Incorporated size test for getnickuserhost() to prevent a remote
    buffer overflow [cmds.c, CAN-2004-1052]


stable/contrib/binary-sparc/atari800_1.2.2-1woody3_sparc.deb
atari800 (1.2.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added size limitation to prevent the execution of arbitrary code while
    in privileged mode [src/log.c]
  * Implemented and utilised strfcpy() to prevent the execution of
    arbitrary code while reading config statements in privileged mode
    [src/rt-config.c, CAN-2004-1076]


stable/contrib/binary-s390/atari800_1.2.2-1woody3_s390.deb
atari800 (1.2.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added size limitation to prevent the execution of arbitrary code while
    in privileged mode [src/log.c]
  * Implemented and utilised strfcpy() to prevent the execution of
    arbitrary code while reading config statements in privileged mode
    [src/rt-config.c, CAN-2004-1076]


stable/contrib/binary-powerpc/atari800_1.2.2-1woody3_powerpc.deb
atari800 (1.2.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added size limitation to prevent the execution of arbitrary code while
    in privileged mode [src/log.c]
  * Implemented and utilised strfcpy() to prevent the execution of
    arbitrary code while reading config statements in privileged mode
    [src/rt-config.c, CAN-2004-1076]


stable/contrib/binary-mips/atari800_1.2.2-1woody3_mips.deb
atari800 (1.2.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added size limitation to prevent the execution of arbitrary code while
    in privileged mode [src/log.c]
  * Implemented and utilised strfcpy() to prevent the execution of
    arbitrary code while reading config statements in privileged mode
    [src/rt-config.c, CAN-2004-1076]


stable/contrib/binary-m68k/atari800_1.2.2-1woody3_m68k.deb
atari800 (1.2.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added size limitation to prevent the execution of arbitrary code while
    in privileged mode [src/log.c]
  * Implemented and utilised strfcpy() to prevent the execution of
    arbitrary code while reading config statements in privileged mode
    [src/rt-config.c, CAN-2004-1076]


stable/contrib/binary-ia64/atari800_1.2.2-1woody3_ia64.deb
atari800 (1.2.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added size limitation to prevent the execution of arbitrary code while
    in privileged mode [src/log.c]
  * Implemented and utilised strfcpy() to prevent the execution of
    arbitrary code while reading config statements in privileged mode
    [src/rt-config.c, CAN-2004-1076]


stable/contrib/binary-i386/atari800_1.2.2-1woody3_i386.deb
atari800 (1.2.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added size limitation to prevent the execution of arbitrary code while
    in privileged mode [src/log.c]
  * Implemented and utilised strfcpy() to prevent the execution of
    arbitrary code while reading config statements in privileged mode
    [src/rt-config.c, CAN-2004-1076]


stable/contrib/binary-hppa/atari800_1.2.2-1woody3_hppa.deb
atari800 (1.2.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added size limitation to prevent the execution of arbitrary code while
    in privileged mode [src/log.c]
  * Implemented and utilised strfcpy() to prevent the execution of
    arbitrary code while reading config statements in privileged mode
    [src/rt-config.c, CAN-2004-1076]


stable/contrib/binary-arm/atari800_1.2.2-1woody3_arm.deb
atari800 (1.2.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added size limitation to prevent the execution of arbitrary code while
    in privileged mode [src/log.c]
  * Implemented and utilised strfcpy() to prevent the execution of
    arbitrary code while reading config statements in privileged mode
    [src/rt-config.c, CAN-2004-1076]


stable/contrib/binary-alpha/atari800_1.2.2-1woody3_alpha.deb
atari800 (1.2.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added size limitation to prevent the execution of arbitrary code while
    in privileged mode [src/log.c]
  * Implemented and utilised strfcpy() to prevent the execution of
    arbitrary code while reading config statements in privileged mode
    [src/rt-config.c, CAN-2004-1076]


stable/contrib/source/atari800_1.2.2-1woody3.dsc
stable/contrib/binary-mipsel/atari800_1.2.2-1woody3_mipsel.deb
stable/contrib/source/atari800_1.2.2-1woody3.diff.gz
atari800 (1.2.2-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added size limitation to prevent the execution of arbitrary code while
    in privileged mode [src/log.c]
  * Implemented and utilised strfcpy() to prevent the execution of
    arbitrary code while reading config statements in privileged mode
    [src/rt-config.c, CAN-2004-1076]


stable/main/binary-sparc/apache-common_1.3.26-0woody6_sparc.deb
stable/main/binary-sparc/apache-dev_1.3.26-0woody6_sparc.deb
stable/main/binary-sparc/apache_1.3.26-0woody6_sparc.deb
apache (1.3.26-0woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected handling of user and file supplied data so no overflow can
    happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd]
  * Applied upstream patch to fix a buffer overflow in mod_include
    [debian/patches/x_CAN-2004-0940_mod_include]


stable/main/binary-s390/apache-common_1.3.26-0woody6_s390.deb
stable/main/binary-s390/apache-dev_1.3.26-0woody6_s390.deb
stable/main/binary-s390/apache_1.3.26-0woody6_s390.deb
apache (1.3.26-0woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected handling of user and file supplied data so no overflow can
    happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd]
  * Applied upstream patch to fix a buffer overflow in mod_include
    [debian/patches/x_CAN-2004-0940_mod_include]


stable/main/binary-powerpc/apache-dev_1.3.26-0woody6_powerpc.deb
stable/main/binary-powerpc/apache_1.3.26-0woody6_powerpc.deb
stable/main/binary-powerpc/apache-common_1.3.26-0woody6_powerpc.deb
apache (1.3.26-0woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected handling of user and file supplied data so no overflow can
    happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd]
  * Applied upstream patch to fix a buffer overflow in mod_include
    [debian/patches/x_CAN-2004-0940_mod_include]


stable/main/binary-mips/apache-dev_1.3.26-0woody6_mips.deb
stable/main/binary-mips/apache_1.3.26-0woody6_mips.deb
stable/main/binary-mips/apache-common_1.3.26-0woody6_mips.deb
apache (1.3.26-0woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected handling of user and file supplied data so no overflow can
    happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd]
  * Applied upstream patch to fix a buffer overflow in mod_include
    [debian/patches/x_CAN-2004-0940_mod_include]


stable/main/binary-m68k/apache-dev_1.3.26-0woody6_m68k.deb
stable/main/binary-m68k/apache-common_1.3.26-0woody6_m68k.deb
stable/main/binary-m68k/apache_1.3.26-0woody6_m68k.deb
apache (1.3.26-0woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected handling of user and file supplied data so no overflow can
    happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd]
  * Applied upstream patch to fix a buffer overflow in mod_include
    [debian/patches/x_CAN-2004-0940_mod_include]


stable/main/binary-ia64/apache-common_1.3.26-0woody6_ia64.deb
stable/main/binary-ia64/apache_1.3.26-0woody6_ia64.deb
stable/main/binary-ia64/apache-dev_1.3.26-0woody6_ia64.deb
apache (1.3.26-0woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected handling of user and file supplied data so no overflow can
    happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd]
  * Applied upstream patch to fix a buffer overflow in mod_include
    [debian/patches/x_CAN-2004-0940_mod_include]


stable/main/binary-i386/apache-common_1.3.26-0woody6_i386.deb
stable/main/binary-i386/apache_1.3.26-0woody6_i386.deb
stable/main/binary-i386/apache-dev_1.3.26-0woody6_i386.deb
apache (1.3.26-0woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected handling of user and file supplied data so no overflow can
    happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd]
  * Applied upstream patch to fix a buffer overflow in mod_include
    [debian/patches/x_CAN-2004-0940_mod_include]


stable/main/binary-hppa/apache-common_1.3.26-0woody6_hppa.deb
stable/main/binary-hppa/apache-dev_1.3.26-0woody6_hppa.deb
stable/main/binary-hppa/apache_1.3.26-0woody6_hppa.deb
apache (1.3.26-0woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected handling of user and file supplied data so no overflow can
    happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd]
  * Applied upstream patch to fix a buffer overflow in mod_include
    [debian/patches/x_CAN-2004-0940_mod_include]


stable/main/binary-arm/apache-common_1.3.26-0woody6_arm.deb
stable/main/binary-arm/apache_1.3.26-0woody6_arm.deb
stable/main/binary-arm/apache-dev_1.3.26-0woody6_arm.deb
apache (1.3.26-0woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected handling of user and file supplied data so no overflow can
    happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd]
  * Applied upstream patch to fix a buffer overflow in mod_include
    [debian/patches/x_CAN-2004-0940_mod_include]


stable/main/binary-alpha/apache-common_1.3.26-0woody6_alpha.deb
stable/main/binary-alpha/apache_1.3.26-0woody6_alpha.deb
stable/main/binary-alpha/apache-dev_1.3.26-0woody6_alpha.deb
apache (1.3.26-0woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected handling of user and file supplied data so no overflow can
    happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd]
  * Applied upstream patch to fix a buffer overflow in mod_include
    [debian/patches/x_CAN-2004-0940_mod_include]


stable/main/binary-mipsel/apache-common_1.3.26-0woody6_mipsel.deb
stable/main/binary-mipsel/apache_1.3.26-0woody6_mipsel.deb
stable/main/source/apache_1.3.26-0woody6.dsc
stable/main/binary-all/apache-doc_1.3.26-0woody6_all.deb
stable/main/source/apache_1.3.26-0woody6.diff.gz
stable/main/binary-mipsel/apache-dev_1.3.26-0woody6_mipsel.deb
apache (1.3.26-0woody6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected handling of user and file supplied data so no overflow can
    happen [debian/patches/x_CAN-2004-NOMATCH_htpasswd]
  * Applied upstream patch to fix a buffer overflow in mod_include
    [debian/patches/x_CAN-2004-0940_mod_include]


stable/main/binary-sparc/abiword_1.0.2+cvs.2002.06.05-1woody2_sparc.deb
stable/main/binary-sparc/abiword-common_1.0.2+cvs.2002.06.05-1woody2_sparc.deb
stable/main/binary-sparc/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_sparc.deb
stable/main/binary-sparc/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_sparc.deb
stable/main/binary-sparc/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_sparc.deb
abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a datetime field buffer overflow in the wv library [wv/field.c,
    CAN-2004-0645]


stable/main/binary-s390/abiword-common_1.0.2+cvs.2002.06.05-1woody2_s390.deb
stable/main/binary-s390/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_s390.deb
stable/main/binary-s390/abiword_1.0.2+cvs.2002.06.05-1woody2_s390.deb
stable/main/binary-s390/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_s390.deb
stable/main/binary-s390/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_s390.deb
abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a datetime field buffer overflow in the wv library [wv/field.c,
    CAN-2004-0645]


stable/main/binary-powerpc/abiword-common_1.0.2+cvs.2002.06.05-1woody2_powerpc.deb
stable/main/binary-powerpc/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_powerpc.deb
stable/main/binary-powerpc/abiword_1.0.2+cvs.2002.06.05-1woody2_powerpc.deb
stable/main/binary-powerpc/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_powerpc.deb
stable/main/binary-powerpc/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_powerpc.deb
abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a datetime field buffer overflow in the wv library [wv/field.c,
    CAN-2004-0645]


stable/main/binary-mipsel/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_mipsel.deb
stable/main/binary-mipsel/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_mipsel.deb
stable/main/binary-mipsel/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_mipsel.deb
stable/main/binary-mipsel/abiword-common_1.0.2+cvs.2002.06.05-1woody2_mipsel.deb
stable/main/binary-mipsel/abiword_1.0.2+cvs.2002.06.05-1woody2_mipsel.deb
abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a datetime field buffer overflow in the wv library [wv/field.c,
    CAN-2004-0645]


stable/main/binary-mips/abiword-common_1.0.2+cvs.2002.06.05-1woody2_mips.deb
stable/main/binary-mips/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_mips.deb
stable/main/binary-mips/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_mips.deb
stable/main/binary-mips/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_mips.deb
stable/main/binary-mips/abiword_1.0.2+cvs.2002.06.05-1woody2_mips.deb
abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a datetime field buffer overflow in the wv library [wv/field.c,
    CAN-2004-0645]


stable/main/binary-m68k/abiword-common_1.0.2+cvs.2002.06.05-1woody2_m68k.deb
stable/main/binary-m68k/abiword_1.0.2+cvs.2002.06.05-1woody2_m68k.deb
stable/main/binary-m68k/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_m68k.deb
stable/main/binary-m68k/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_m68k.deb
stable/main/binary-m68k/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_m68k.deb
abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a datetime field buffer overflow in the wv library [wv/field.c,
    CAN-2004-0645]


stable/main/binary-ia64/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_ia64.deb
stable/main/binary-ia64/abiword_1.0.2+cvs.2002.06.05-1woody2_ia64.deb
stable/main/binary-ia64/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_ia64.deb
stable/main/binary-ia64/abiword-common_1.0.2+cvs.2002.06.05-1woody2_ia64.deb
stable/main/binary-ia64/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_ia64.deb
abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a datetime field buffer overflow in the wv library [wv/field.c,
    CAN-2004-0645]


stable/main/binary-hppa/abiword-common_1.0.2+cvs.2002.06.05-1woody2_hppa.deb
stable/main/binary-hppa/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_hppa.deb
stable/main/binary-hppa/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_hppa.deb
stable/main/binary-hppa/abiword_1.0.2+cvs.2002.06.05-1woody2_hppa.deb
stable/main/binary-hppa/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_hppa.deb
abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a datetime field buffer overflow in the wv library [wv/field.c,
    CAN-2004-0645]


stable/main/binary-arm/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_arm.deb
stable/main/binary-arm/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_arm.deb
stable/main/binary-arm/abiword_1.0.2+cvs.2002.06.05-1woody2_arm.deb
stable/main/binary-arm/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_arm.deb
stable/main/binary-arm/abiword-common_1.0.2+cvs.2002.06.05-1woody2_arm.deb
abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a datetime field buffer overflow in the wv library [wv/field.c,
    CAN-2004-0645]


stable/main/binary-alpha/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_alpha.deb
stable/main/binary-alpha/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_alpha.deb
stable/main/binary-alpha/abiword-common_1.0.2+cvs.2002.06.05-1woody2_alpha.deb
stable/main/binary-alpha/abiword_1.0.2+cvs.2002.06.05-1woody2_alpha.deb
stable/main/binary-alpha/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_alpha.deb
abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a datetime field buffer overflow in the wv library [wv/field.c,
    CAN-2004-0645]


stable/main/source/abiword_1.0.2+cvs.2002.06.05-1woody2.diff.gz
stable/main/source/abiword_1.0.2+cvs.2002.06.05-1woody2.dsc
stable/main/binary-i386/abiword-plugins_1.0.2+cvs.2002.06.05-1woody2_i386.deb
stable/main/binary-all/abiword-doc_1.0.2+cvs.2002.06.05-1woody2_all.deb
stable/main/binary-i386/abiword_1.0.2+cvs.2002.06.05-1woody2_i386.deb
stable/main/binary-i386/abiword-gnome_1.0.2+cvs.2002.06.05-1woody2_i386.deb
stable/main/binary-i386/abiword-gtk_1.0.2+cvs.2002.06.05-1woody2_i386.deb
stable/main/binary-all/xfonts-abi_1.0.2+cvs.2002.06.05-1woody2_all.deb
stable/main/binary-i386/abiword-common_1.0.2+cvs.2002.06.05-1woody2_i386.deb
abiword (1.0.2+cvs.2002.06.05-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a datetime field buffer overflow in the wv library [wv/field.c,
    CAN-2004-0645]


stable/main/binary-sparc/a2ps_4.13b-16woody1_sparc.deb
a2ps (4.13b-16woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Moritz Muehlenhoff to fix command execution
    vulnerability [src/select.c, CAN-2004-1170]
  * Lowered build dependency for emacsen to emacs20 | emacsen so that
    apt-get can cope with it


stable/main/binary-s390/a2ps_4.13b-16woody1_s390.deb
a2ps (4.13b-16woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Moritz Muehlenhoff to fix command execution
    vulnerability [src/select.c, CAN-2004-1170]
  * Lowered build dependency for emacsen to emacs20 | emacsen so that
    apt-get can cope with it


stable/main/binary-powerpc/a2ps_4.13b-16woody1_powerpc.deb
a2ps (4.13b-16woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Moritz Muehlenhoff to fix command execution
    vulnerability [src/select.c, CAN-2004-1170]
  * Lowered build dependency for emacsen to emacs20 | emacsen so that
    apt-get can cope with it


stable/main/binary-mipsel/a2ps_4.13b-16woody1_mipsel.deb
a2ps (4.13b-16woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Moritz Muehlenhoff to fix command execution
    vulnerability [src/select.c, CAN-2004-1170]
  * Lowered build dependency for emacsen to emacs20 | emacsen so that
    apt-get can cope with it


stable/main/binary-mips/a2ps_4.13b-16woody1_mips.deb
a2ps (4.13b-16woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Moritz Muehlenhoff to fix command execution
    vulnerability [src/select.c, CAN-2004-1170]
  * Lowered build dependency for emacsen to emacs20 | emacsen so that
    apt-get can cope with it


stable/main/binary-m68k/a2ps_4.13b-16woody1_m68k.deb
a2ps (4.13b-16woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Moritz Muehlenhoff to fix command execution
    vulnerability [src/select.c, CAN-2004-1170]
  * Lowered build dependency for emacsen to emacs20 | emacsen so that
    apt-get can cope with it


stable/main/binary-ia64/a2ps_4.13b-16woody1_ia64.deb
a2ps (4.13b-16woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Moritz Muehlenhoff to fix command execution
    vulnerability [src/select.c, CAN-2004-1170]
  * Lowered build dependency for emacsen to emacs20 | emacsen so that
    apt-get can cope with it


stable/main/binary-hppa/a2ps_4.13b-16woody1_hppa.deb
a2ps (4.13b-16woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Moritz Muehlenhoff to fix command execution
    vulnerability [src/select.c, CAN-2004-1170]
  * Lowered build dependency for emacsen to emacs20 | emacsen so that
    apt-get can cope with it


stable/main/binary-arm/a2ps_4.13b-16woody1_arm.deb
a2ps (4.13b-16woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Moritz Muehlenhoff to fix command execution
    vulnerability [src/select.c, CAN-2004-1170]
  * Lowered build dependency for emacsen to emacs20 | emacsen so that
    apt-get can cope with it


stable/main/binary-alpha/a2ps_4.13b-16woody1_alpha.deb
a2ps (4.13b-16woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Moritz Muehlenhoff to fix command execution
    vulnerability [src/select.c, CAN-2004-1170]
  * Lowered build dependency for emacsen to emacs20 | emacsen so that
    apt-get can cope with it


stable/main/source/a2ps_4.13b-16woody1.dsc
stable/main/source/a2ps_4.13b-16woody1.diff.gz
stable/main/binary-i386/a2ps_4.13b-16woody1_i386.deb
a2ps (4.13b-16woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Moritz Muehlenhoff to fix command execution
    vulnerability [src/select.c, CAN-2004-1170]
  * Lowered build dependency for emacsen to emacs20 | emacsen so that
    apt-get can cope with it


========================================= 
Mon,  25 Oct 2004 - Debian 3.0r3 released
=========================================

Removed the following packages from stable:

       aspell | 0.33.7.1-8 | source, alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc
   aspell-doc | 0.33.7.1-8 | all
    aspell-en | 0.33.7.1-8 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc
libaspell-dev | 0.33.7.1-8 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc
  libaspell10 | 0.33.7.1-8 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc

 (Reason: as requested by Stable Release Manager)
   "Broken package, removed on request of maintainer.  (Bug#146326,
    Bug#164681)"

--

   gnomesword |   0.5.2c-8 | source, alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc

 (Reason: as requested by Stable Release Manager)
   "Broken package, removed on request of maintainer.  (Bug#146326,
    Bug#164681)"

--

        hdate |     2.36-2 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc

 (Reason: as requested by Stable Release Manager)
   "This package contains more than one licence and they stand in
    conflict with each other.

    Bug#225537 - http://www.debian.org/devel/wnpp/unable-hdate"

--

         heyu |     1.33-3 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc

 (Reason: as requested by Stable Release Manager)
   "The copyright clearly indicates that the package is non-free.
    Hence, removed due to the license."

--

    kernel-patch-2.4.0-ia64 |   010125-1 | source, all
kernel-patch-2.4.0-reiserfs |   3.6.25-4 | source, all
    kernel-patch-2.4.1-ia64 |   010131-3 | source, all

 (Reason: as requested by Stable Release Manager)
   "This package became unusable.  Needs kernel-source-2.4.{0,1},
    which doesn't exist. (Bug#184524)"

--

        pcmcia-modules-2.2.22 | 3.1.33-6k1 | i386
pcmcia-modules-2.2.22-compact | 3.1.33-6k1 | i386
 pcmcia-modules-2.2.22-idepci | 3.1.33-6k1 | i386

 (Reason: as requested by Stable Release Manager)
   "Unsatisfiable Depends: kernel-image-2.2.22 (= 2.2.22-1)"

--

    spellcast |     1.0-12 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc
spellcast-doc |        1.0 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc

 (Reason: as requested by Stable Release Manager)
   "This package is non-free, and not going to become free again, so
    there's no desire to compile it for all architectures and move it
    into non-free.  See Bug#241002."

--

                ttf-xtt | 0.20010818-5 | source
 ttf-xtt-wadalab-gothic | 0.20010818-5 | all
ttf-xtt-watanabe-mincho | 0.20010818-5 | all
   ttf-xwatanabe-mincho | 0.2001.1201-1 | source, all
         watanabe-vfont |        1-9 | source, all

 (Reason: as requested by Stable Release Manager)
   "License problems: Bug#214395, Bug#214400, Bug#214587, Bug#214399

    http://lists.debian.org/debian-devel/2003/debian-devel-200310/msg00223.html"

--

       xroach |      4.0-8 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc

 (Reason: as requested by Stable Release Manager)
   "In Bug#158188 Joey Hess writes: That is not free as it does not
    allow modificaton, or sale. As I have to modify the package to
    package it, I think it best it just be removed from debian. I will
    try to contact the author, if the license if fixed we can add it
    back.

    License: This program may be freely distributed provided that all
    copyright notices are retained.

    All trials to get in touch with the original author failed."

--

stable/main/binary-sparc/zope_2.5.1-1woody1_sparc.deb
zope (2.5.1-1woody1) stable-security; urgency=high
  * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects).
    Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert.
    [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688]


stable/main/binary-s390/zope_2.5.1-1woody1_s390.deb
zope (2.5.1-1woody1) stable-security; urgency=high
  * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects).
    Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert.
    [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688]


stable/main/binary-powerpc/zope_2.5.1-1woody1_powerpc.deb
zope (2.5.1-1woody1) stable-security; urgency=high
  * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects).
    Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert.
    [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688]


stable/main/binary-mipsel/zope_2.5.1-1woody1_mipsel.deb
zope (2.5.1-1woody1) stable-security; urgency=high
  * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects).
    Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert.
    [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688]


stable/main/binary-mips/zope_2.5.1-1woody1_mips.deb
zope (2.5.1-1woody1) stable-security; urgency=high
  * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects).
    Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert.
    [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688]


stable/main/binary-m68k/zope_2.5.1-1woody1_m68k.deb
zope (2.5.1-1woody1) stable-security; urgency=high
  * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects).
    Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert.
    [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688]


stable/main/binary-ia64/zope_2.5.1-1woody1_ia64.deb
zope (2.5.1-1woody1) stable-security; urgency=high
  * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects).
    Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert.
    [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688]


stable/main/binary-hppa/zope_2.5.1-1woody1_hppa.deb
zope (2.5.1-1woody1) stable-security; urgency=high
  * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects).
    Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert.
    [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688]


stable/main/binary-arm/zope_2.5.1-1woody1_arm.deb
zope (2.5.1-1woody1) stable-security; urgency=high
  * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects).
    Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert.
    [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688]


stable/main/binary-alpha/zope_2.5.1-1woody1_alpha.deb
zope (2.5.1-1woody1) stable-security; urgency=high
  * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects).
    Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert.
    [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688]


stable/main/source/zope_2.5.1-1woody1.diff.gz
stable/main/source/zope_2.5.1-1woody1.dsc
stable/main/binary-i386/zope_2.5.1-1woody1_i386.deb
zope (2.5.1-1woody1) stable-security; urgency=high
  * Applied Zope Hotfix_2003-06-14 (security of the indexes of ZCatalog objects).
    Cf. http://zope.org/Products/Zope/Hotfix_2002-06-14/security_alert.
    [lib/python/Products/Hotfix_2002-06-14/, CVE-2002-0688]


stable/main/binary-sparc/zebra_0.92a-5woody2_sparc.deb
zebra (0.92a-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-s390/zebra_0.92a-5woody2_s390.deb
zebra (0.92a-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-powerpc/zebra_0.92a-5woody2_powerpc.deb
zebra (0.92a-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-mipsel/zebra_0.92a-5woody2_mipsel.deb
zebra (0.92a-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-mips/zebra_0.92a-5woody2_mips.deb
zebra (0.92a-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-m68k/zebra_0.92a-5woody2_m68k.deb
zebra (0.92a-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-ia64/zebra_0.92a-5woody2_ia64.deb
zebra (0.92a-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-hppa/zebra_0.92a-5woody2_hppa.deb
zebra (0.92a-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-arm/zebra_0.92a-5woody2_arm.deb
zebra (0.92a-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-alpha/zebra_0.92a-5woody2_alpha.deb
zebra (0.92a-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/source/zebra_0.92a-5woody2.dsc
stable/main/source/zebra_0.92a-5woody2.diff.gz
stable/main/binary-i386/zebra_0.92a-5woody2_i386.deb
stable/main/binary-all/zebra-doc_0.92a-5woody2_all.deb
zebra (0.92a-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-sparc/xsok_1.02-9woody2_sparc.deb
xsok (1.02-9woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Drop extra privileges before invoking external commands.
    (CAN-2003-0949)
  * Rebuilt so the dependency will be against libaw6 as before.


stable/main/binary-s390/xsok_1.02-9woody2_s390.deb
xsok (1.02-9woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Drop extra privileges before invoking external commands.
    (CAN-2003-0949)
  * Rebuilt so the dependency will be against libaw6 as before.


stable/main/binary-powerpc/xsok_1.02-9woody2_powerpc.deb
xsok (1.02-9woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Drop extra privileges before invoking external commands.
    (CAN-2003-0949)
  * Rebuilt so the dependency will be against libaw6 as before.


stable/main/binary-mipsel/xsok_1.02-9woody2_mipsel.deb
xsok (1.02-9woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Drop extra privileges before invoking external commands.
    (CAN-2003-0949)
  * Rebuilt so the dependency will be against libaw6 as before.


stable/main/binary-mips/xsok_1.02-9woody2_mips.deb
xsok (1.02-9woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Drop extra privileges before invoking external commands.
    (CAN-2003-0949)
  * Rebuilt so the dependency will be against libaw6 as before.


stable/main/binary-m68k/xsok_1.02-9woody2_m68k.deb
xsok (1.02-9woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Drop extra privileges before invoking external commands.
    (CAN-2003-0949)
  * Rebuilt so the dependency will be against libaw6 as before.


stable/main/binary-ia64/xsok_1.02-9woody2_ia64.deb
xsok (1.02-9woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Drop extra privileges before invoking external commands.
    (CAN-2003-0949)
  * Rebuilt so the dependency will be against libaw6 as before.


stable/main/binary-hppa/xsok_1.02-9woody2_hppa.deb
xsok (1.02-9woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Drop extra privileges before invoking external commands.
    (CAN-2003-0949)
  * Rebuilt so the dependency will be against libaw6 as before.


stable/main/binary-arm/xsok_1.02-9woody2_arm.deb
xsok (1.02-9woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Drop extra privileges before invoking external commands.
    (CAN-2003-0949)
  * Rebuilt so the dependency will be against libaw6 as before.


stable/main/binary-alpha/xsok_1.02-9woody2_alpha.deb
xsok (1.02-9woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Drop extra privileges before invoking external commands.
    (CAN-2003-0949)
  * Rebuilt so the dependency will be against libaw6 as before.


stable/main/source/xsok_1.02-9woody2.diff.gz
stable/main/binary-i386/xsok_1.02-9woody2_i386.deb
stable/main/source/xsok_1.02-9woody2.dsc
xsok (1.02-9woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Drop extra privileges before invoking external commands.
    (CAN-2003-0949)
  * Rebuilt so the dependency will be against libaw6 as before.


stable/main/binary-sparc/xpcd_2.08-8woody2_sparc.deb
stable/main/binary-sparc/xpcd-gimp_2.08-8woody2_sparc.deb
xpcd (2.08-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402)


stable/main/binary-s390/xpcd-gimp_2.08-8woody2_s390.deb
stable/main/binary-s390/xpcd_2.08-8woody2_s390.deb
xpcd (2.08-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402)


stable/main/binary-powerpc/xpcd_2.08-8woody2_powerpc.deb
stable/main/binary-powerpc/xpcd-gimp_2.08-8woody2_powerpc.deb
xpcd (2.08-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402)


stable/main/binary-mipsel/xpcd_2.08-8woody2_mipsel.deb
stable/main/binary-mipsel/xpcd-gimp_2.08-8woody2_mipsel.deb
xpcd (2.08-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402)


stable/main/binary-mips/xpcd-gimp_2.08-8woody2_mips.deb
stable/main/binary-mips/xpcd_2.08-8woody2_mips.deb
xpcd (2.08-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402)


stable/main/binary-m68k/xpcd_2.08-8woody2_m68k.deb
stable/main/binary-m68k/xpcd-gimp_2.08-8woody2_m68k.deb
xpcd (2.08-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402)


stable/main/binary-ia64/xpcd_2.08-8woody2_ia64.deb
stable/main/binary-ia64/xpcd-gimp_2.08-8woody2_ia64.deb
xpcd (2.08-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402)


stable/main/binary-hppa/xpcd-gimp_2.08-8woody2_hppa.deb
stable/main/binary-hppa/xpcd_2.08-8woody2_hppa.deb
xpcd (2.08-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402)


stable/main/binary-arm/xpcd-gimp_2.08-8woody2_arm.deb
stable/main/binary-arm/xpcd_2.08-8woody2_arm.deb
xpcd (2.08-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402)


stable/main/binary-alpha/xpcd-gimp_2.08-8woody2_alpha.deb
stable/main/binary-alpha/xpcd_2.08-8woody2_alpha.deb
xpcd (2.08-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402)


stable/main/binary-i386/xpcd-svga_2.08-8woody2_i386.deb
stable/main/source/xpcd_2.08-8woody2.dsc
stable/main/binary-i386/xpcd_2.08-8woody2_i386.deb
stable/main/binary-i386/xpcd-gimp_2.08-8woody2_i386.deb
stable/main/source/xpcd_2.08-8woody2.diff.gz
xpcd (2.08-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix sprintf buffer overflow in pcd_open (CAN-2004-0402)


stable/main/binary-sparc/xonix_1.4-19woody1_sparc.deb
xonix (1.4-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Drop privileges before invoking external mailer command when
    highscores are achieved. (CAN-2004-0157)


stable/main/binary-s390/xonix_1.4-19woody1_s390.deb
xonix (1.4-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Drop privileges before invoking external mailer command when
    highscores are achieved. (CAN-2004-0157)


stable/main/binary-powerpc/xonix_1.4-19woody1_powerpc.deb
xonix (1.4-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Drop privileges before invoking external mailer command when
    highscores are achieved. (CAN-2004-0157)


stable/main/binary-mipsel/xonix_1.4-19woody1_mipsel.deb
xonix (1.4-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Drop privileges before invoking external mailer command when
    highscores are achieved. (CAN-2004-0157)


stable/main/binary-mips/xonix_1.4-19woody1_mips.deb
xonix (1.4-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Drop privileges before invoking external mailer command when
    highscores are achieved. (CAN-2004-0157)


stable/main/binary-m68k/xonix_1.4-19woody1_m68k.deb
xonix (1.4-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Drop privileges before invoking external mailer command when
    highscores are achieved. (CAN-2004-0157)


stable/main/binary-ia64/xonix_1.4-19woody1_ia64.deb
xonix (1.4-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Drop privileges before invoking external mailer command when
    highscores are achieved. (CAN-2004-0157)


stable/main/binary-hppa/xonix_1.4-19woody1_hppa.deb
xonix (1.4-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Drop privileges before invoking external mailer command when
    highscores are achieved. (CAN-2004-0157)


stable/main/binary-arm/xonix_1.4-19woody1_arm.deb
xonix (1.4-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Drop privileges before invoking external mailer command when
    highscores are achieved. (CAN-2004-0157)


stable/main/binary-alpha/xonix_1.4-19woody1_alpha.deb
xonix (1.4-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Drop privileges before invoking external mailer command when
    highscores are achieved. (CAN-2004-0157)


stable/main/source/xonix_1.4-19woody1.dsc
stable/main/source/xonix_1.4-19woody1.diff.gz
stable/main/binary-i386/xonix_1.4-19woody1_i386.deb
xonix (1.4-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Drop privileges before invoking external mailer command when
    highscores are achieved. (CAN-2004-0157)


stable/main/binary-sparc/xitalk_1.1.11-9.1woody1_sparc.deb
xitalk (1.1.11-9.1woody1) stable-security; urgency=high
  * Non-maintainer upload by The Security Team
  * Drop all privileges before invoking external commands
    (CAN-2004-0151)


stable/main/binary-s390/xitalk_1.1.11-9.1woody1_s390.deb
xitalk (1.1.11-9.1woody1) stable-security; urgency=high
  * Non-maintainer upload by The Security Team
  * Drop all privileges before invoking external commands
    (CAN-2004-0151)


stable/main/binary-powerpc/xitalk_1.1.11-9.1woody1_powerpc.deb
xitalk (1.1.11-9.1woody1) stable-security; urgency=high
  * Non-maintainer upload by The Security Team
  * Drop all privileges before invoking external commands
    (CAN-2004-0151)


stable/main/binary-mipsel/xitalk_1.1.11-9.1woody1_mipsel.deb
xitalk (1.1.11-9.1woody1) stable-security; urgency=high
  * Non-maintainer upload by The Security Team
  * Drop all privileges before invoking external commands
    (CAN-2004-0151)


stable/main/binary-mips/xitalk_1.1.11-9.1woody1_mips.deb
xitalk (1.1.11-9.1woody1) stable-security; urgency=high
  * Non-maintainer upload by The Security Team
  * Drop all privileges before invoking external commands
    (CAN-2004-0151)


stable/main/binary-m68k/xitalk_1.1.11-9.1woody1_m68k.deb
xitalk (1.1.11-9.1woody1) stable-security; urgency=high
  * Non-maintainer upload by The Security Team
  * Drop all privileges before invoking external commands
    (CAN-2004-0151)


stable/main/binary-ia64/xitalk_1.1.11-9.1woody1_ia64.deb
xitalk (1.1.11-9.1woody1) stable-security; urgency=high
  * Non-maintainer upload by The Security Team
  * Drop all privileges before invoking external commands
    (CAN-2004-0151)


stable/main/binary-hppa/xitalk_1.1.11-9.1woody1_hppa.deb
xitalk (1.1.11-9.1woody1) stable-security; urgency=high
  * Non-maintainer upload by The Security Team
  * Drop all privileges before invoking external commands
    (CAN-2004-0151)


stable/main/binary-arm/xitalk_1.1.11-9.1woody1_arm.deb
xitalk (1.1.11-9.1woody1) stable-security; urgency=high
  * Non-maintainer upload by The Security Team
  * Drop all privileges before invoking external commands
    (CAN-2004-0151)


stable/main/binary-alpha/xitalk_1.1.11-9.1woody1_alpha.deb
xitalk (1.1.11-9.1woody1) stable-security; urgency=high
  * Non-maintainer upload by The Security Team
  * Drop all privileges before invoking external commands
    (CAN-2004-0151)


stable/main/binary-i386/xitalk_1.1.11-9.1woody1_i386.deb
stable/main/source/xitalk_1.1.11-9.1woody1.dsc
stable/main/source/xitalk_1.1.11-9.1woody1.diff.gz
xitalk (1.1.11-9.1woody1) stable-security; urgency=high
  * Non-maintainer upload by The Security Team
  * Drop all privileges before invoking external commands
    (CAN-2004-0151)


stable/main/binary-s390/xine-ui_0.9.8-5.1_s390.deb
xine-ui (0.9.8-5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-powerpc/xine-ui_0.9.8-5.1_powerpc.deb
xine-ui (0.9.8-5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mipsel/xine-ui_0.9.8-5.1_mipsel.deb
xine-ui (0.9.8-5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mips/xine-ui_0.9.8-5.1_mips.deb
xine-ui (0.9.8-5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-m68k/xine-ui_0.9.8-5.1_m68k.deb
xine-ui (0.9.8-5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-ia64/xine-ui_0.9.8-5.1_ia64.deb
xine-ui (0.9.8-5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-i386/xine-ui_0.9.8-5.1_i386.deb
xine-ui (0.9.8-5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-hppa/xine-ui_0.9.8-5.1_hppa.deb
xine-ui (0.9.8-5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-arm/xine-ui_0.9.8-5.1_arm.deb
xine-ui (0.9.8-5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-alpha/xine-ui_0.9.8-5.1_alpha.deb
xine-ui (0.9.8-5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/source/xine-ui_0.9.8-5.1.dsc
stable/main/binary-sparc/xine-ui_0.9.8-5.1_sparc.deb
stable/main/source/xine-ui_0.9.8-5.1.diff.gz
xine-ui (0.9.8-5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-sparc/xbase-clients_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xdm_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xserver-common_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xserver-xfree86_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xlibs-pic_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/libdps1_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xlibosmesa3-dbg_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xlibmesa3-dbg_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xfs_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/libxaw7-dev_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xmh_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/libxaw7_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/libxaw6-dev_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xvfb_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xfwp_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xlibs-dbg_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xlibmesa3_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xutils_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/libdps1-dbg_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xterm_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/proxymngr_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xlibs_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xlibs-dev_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xprt_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/x-window-system-core_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/libxaw6_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/libxaw7-dbg_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xlibmesa-dev_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/libxaw6-dbg_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xlibosmesa3_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/twm_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/libdps-dev_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xlibosmesa-dev_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/lbxproxy_4.1.0-16woody4_sparc.deb
stable/main/binary-sparc/xnest_4.1.0-16woody4_sparc.deb
xfree86 (4.1.0-16woody4) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm


stable/main/binary-s390/xvfb_4.1.0-16woody4_s390.deb
stable/main/binary-s390/xlibmesa3-dbg_4.1.0-16woody4_s390.deb
stable/main/binary-s390/xlibs-dev_4.1.0-16woody4_s390.deb
stable/main/binary-s390/libxaw7-dev_4.1.0-16woody4_s390.deb
stable/main/binary-s390/libxaw6-dev_4.1.0-16woody4_s390.deb
stable/main/binary-s390/libxaw6-dbg_4.1.0-16woody4_s390.deb
stable/main/binary-s390/xmh_4.1.0-16woody4_s390.deb
stable/main/binary-s390/twm_4.1.0-16woody4_s390.deb
stable/main/binary-s390/libxaw6_4.1.0-16woody4_s390.deb
stable/main/binary-s390/xlibmesa-dev_4.1.0-16woody4_s390.deb
stable/main/binary-s390/libxaw7_4.1.0-16woody4_s390.deb
stable/main/binary-s390/xdm_4.1.0-16woody4_s390.deb
stable/main/binary-s390/libxaw7-dbg_4.1.0-16woody4_s390.deb
stable/main/binary-s390/libdps1_4.1.0-16woody4_s390.deb
stable/main/binary-s390/xterm_4.1.0-16woody4_s390.deb
stable/main/binary-s390/xlibs_4.1.0-16woody4_s390.deb
stable/main/binary-s390/xutils_4.1.0-16woody4_s390.deb
stable/main/binary-s390/xnest_4.1.0-16woody4_s390.deb
stable/main/binary-s390/xfs_4.1.0-16woody4_s390.deb
stable/main/binary-s390/xlibmesa3_4.1.0-16woody4_s390.deb
stable/main/binary-s390/x-window-system-core_4.1.0-16woody4_s390.deb
stable/main/binary-s390/libdps-dev_4.1.0-16woody4_s390.deb
stable/main/binary-s390/xlibs-pic_4.1.0-16woody4_s390.deb
stable/main/binary-s390/xbase-clients_4.1.0-16woody4_s390.deb
stable/main/binary-s390/lbxproxy_4.1.0-16woody4_s390.deb
stable/main/binary-s390/xlibs-dbg_4.1.0-16woody4_s390.deb
stable/main/binary-s390/xserver-common_4.1.0-16woody4_s390.deb
stable/main/binary-s390/xfwp_4.1.0-16woody4_s390.deb
stable/main/binary-s390/xprt_4.1.0-16woody4_s390.deb
stable/main/binary-s390/proxymngr_4.1.0-16woody4_s390.deb
stable/main/binary-s390/libdps1-dbg_4.1.0-16woody4_s390.deb
xfree86 (4.1.0-16woody4) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm


stable/main/binary-mipsel/xbase-clients_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/xnest_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/xlibs-pic_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/xserver-xfree86_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/libxaw7_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/proxymngr_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/xfwp_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/xmh_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/lbxproxy_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/xfs_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/twm_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/xlibs-dev_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/xdm_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/xserver-common_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/libxaw7-dbg_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/libdps1_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/xutils_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/xvfb_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/xlibmesa3-dbg_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/xlibmesa3_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/xprt_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/libxaw6-dev_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/xlibmesa-dev_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/libdps1-dbg_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/x-window-system-core_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/libxaw6_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/libxaw6-dbg_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/xterm_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/libxaw7-dev_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/libdps-dev_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/xlibs-dbg_4.1.0-16woody4_mipsel.deb
stable/main/binary-mipsel/xlibs_4.1.0-16woody4_mipsel.deb
xfree86 (4.1.0-16woody4) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm


stable/main/binary-mips/xvfb_4.1.0-16woody4_mips.deb
stable/main/binary-mips/twm_4.1.0-16woody4_mips.deb
stable/main/binary-mips/xbase-clients_4.1.0-16woody4_mips.deb
stable/main/binary-mips/xprt_4.1.0-16woody4_mips.deb
stable/main/binary-mips/xserver-xfree86_4.1.0-16woody4_mips.deb
stable/main/binary-mips/lbxproxy_4.1.0-16woody4_mips.deb
stable/main/binary-mips/xterm_4.1.0-16woody4_mips.deb
stable/main/binary-mips/xlibmesa3_4.1.0-16woody4_mips.deb
stable/main/binary-mips/libxaw6-dev_4.1.0-16woody4_mips.deb
stable/main/binary-mips/xutils_4.1.0-16woody4_mips.deb
stable/main/binary-mips/libxaw7-dev_4.1.0-16woody4_mips.deb
stable/main/binary-mips/libxaw7_4.1.0-16woody4_mips.deb
stable/main/binary-mips/xlibs-pic_4.1.0-16woody4_mips.deb
stable/main/binary-mips/x-window-system-core_4.1.0-16woody4_mips.deb
stable/main/binary-mips/libdps1_4.1.0-16woody4_mips.deb
stable/main/binary-mips/xlibs-dev_4.1.0-16woody4_mips.deb
stable/main/binary-mips/xdm_4.1.0-16woody4_mips.deb
stable/main/binary-mips/xnest_4.1.0-16woody4_mips.deb
stable/main/binary-mips/xserver-common_4.1.0-16woody4_mips.deb
stable/main/binary-mips/libxaw7-dbg_4.1.0-16woody4_mips.deb
stable/main/binary-mips/libdps1-dbg_4.1.0-16woody4_mips.deb
stable/main/binary-mips/xlibmesa-dev_4.1.0-16woody4_mips.deb
stable/main/binary-mips/libxaw6-dbg_4.1.0-16woody4_mips.deb
stable/main/binary-mips/xfs_4.1.0-16woody4_mips.deb
stable/main/binary-mips/xlibs-dbg_4.1.0-16woody4_mips.deb
stable/main/binary-mips/libdps-dev_4.1.0-16woody4_mips.deb
stable/main/binary-mips/xfwp_4.1.0-16woody4_mips.deb
stable/main/binary-mips/xlibmesa3-dbg_4.1.0-16woody4_mips.deb
stable/main/binary-mips/xmh_4.1.0-16woody4_mips.deb
stable/main/binary-mips/proxymngr_4.1.0-16woody4_mips.deb
stable/main/binary-mips/libxaw6_4.1.0-16woody4_mips.deb
stable/main/binary-mips/xlibs_4.1.0-16woody4_mips.deb
xfree86 (4.1.0-16woody4) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm


stable/main/binary-m68k/libdps1-dbg_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/libxaw7-dbg_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/xdm_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/xlibs-dev_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/libxaw7_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/xutils_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/xfwp_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/x-window-system-core_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/libdps-dev_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/xlibs-dbg_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/xfs_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/xbase-clients_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/libxaw6_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/xserver-common_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/xprt_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/xnest_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/proxymngr_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/xmh_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/lbxproxy_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/xlibmesa-dev_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/libxaw7-dev_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/xlibmesa3-dbg_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/libxaw6-dbg_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/xlibmesa3_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/libxaw6-dev_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/libdps1_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/xlibs-pic_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/xterm_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/xlibs_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/twm_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/xvfb_4.1.0-16woody4_m68k.deb
stable/main/binary-m68k/xserver-xfree86_4.1.0-16woody4_m68k.deb
xfree86 (4.1.0-16woody4) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm


stable/main/binary-ia64/lbxproxy_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xlibmesa3-dbg_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/libxaw7-dev_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/libxaw6-dev_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/libxaw7_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/proxymngr_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xprt_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/twm_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xutils_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xfs_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xnest_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xlibosmesa3_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xserver-xfree86_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/libdps1-dbg_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xlibmesa-dev_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/libdps1_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xlibmesa3_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xlibosmesa-dev_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xserver-common_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xterm_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/x-window-system-core_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/libxaw6-dbg_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/libxaw7-dbg_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xlibs-pic_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xlibs_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xdm_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xbase-clients_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xlibosmesa3-dbg_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xlibs-dbg_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xvfb_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/libdps-dev_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xlibs-dev_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xmh_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/xfwp_4.1.0-16woody4_ia64.deb
stable/main/binary-ia64/libxaw6_4.1.0-16woody4_ia64.deb
xfree86 (4.1.0-16woody4) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm


stable/main/binary-i386/x-window-system-core_4.1.0-16woody4_i386.deb
stable/main/binary-i386/proxymngr_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xnest_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xlibs_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xlibosmesa3_4.1.0-16woody4_i386.deb
stable/main/binary-i386/libxaw6-dev_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xlibosmesa3-dbg_4.1.0-16woody4_i386.deb
stable/main/binary-i386/libdps-dev_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xterm_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xdm_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xlibs-pic_4.1.0-16woody4_i386.deb
stable/main/binary-i386/libxaw7_4.1.0-16woody4_i386.deb
stable/main/binary-i386/libdps1-dbg_4.1.0-16woody4_i386.deb
stable/main/binary-i386/twm_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xlibmesa3-dbg_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xlibmesa-dev_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xserver-common_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xlibosmesa-dev_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xlibs-dbg_4.1.0-16woody4_i386.deb
stable/main/binary-i386/libxaw7-dev_4.1.0-16woody4_i386.deb
stable/main/binary-i386/libdps1_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xutils_4.1.0-16woody4_i386.deb
stable/main/binary-i386/lbxproxy_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xvfb_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xbase-clients_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xlibs-dev_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xlibmesa3_4.1.0-16woody4_i386.deb
stable/main/binary-i386/libxaw6_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xfwp_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xmh_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xserver-xfree86_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xprt_4.1.0-16woody4_i386.deb
stable/main/binary-i386/libxaw6-dbg_4.1.0-16woody4_i386.deb
stable/main/binary-i386/libxaw7-dbg_4.1.0-16woody4_i386.deb
stable/main/binary-i386/xfs_4.1.0-16woody4_i386.deb
xfree86 (4.1.0-16woody4) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm


stable/main/binary-hppa/xlibmesa3-dbg_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/libxaw7-dev_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/xserver-xfree86_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/xlibmesa-dev_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/libxaw6-dbg_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/xserver-common_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/libxaw7-dbg_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/xlibs-pic_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/xlibs_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/xprt_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/x-window-system-core_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/xvfb_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/xfwp_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/libxaw6_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/lbxproxy_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/xmh_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/twm_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/proxymngr_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/xlibs-dev_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/xdm_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/libxaw6-dev_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/xutils_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/xlibs-dbg_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/libdps-dev_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/xbase-clients_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/libdps1_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/xlibmesa3_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/libxaw7_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/xfs_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/xnest_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/libdps1-dbg_4.1.0-16woody4_hppa.deb
stable/main/binary-hppa/xterm_4.1.0-16woody4_hppa.deb
xfree86 (4.1.0-16woody4) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm


stable/main/binary-arm/libdps1_4.1.0-16woody4_arm.deb
stable/main/binary-arm/xnest_4.1.0-16woody4_arm.deb
stable/main/binary-arm/xfwp_4.1.0-16woody4_arm.deb
stable/main/binary-arm/libxaw7-dbg_4.1.0-16woody4_arm.deb
stable/main/binary-arm/xdm_4.1.0-16woody4_arm.deb
stable/main/binary-arm/libdps-dev_4.1.0-16woody4_arm.deb
stable/main/binary-arm/xterm_4.1.0-16woody4_arm.deb
stable/main/binary-arm/xmh_4.1.0-16woody4_arm.deb
stable/main/binary-arm/proxymngr_4.1.0-16woody4_arm.deb
stable/main/binary-arm/xlibmesa3_4.1.0-16woody4_arm.deb
stable/main/binary-arm/x-window-system-core_4.1.0-16woody4_arm.deb
stable/main/binary-arm/libdps1-dbg_4.1.0-16woody4_arm.deb
stable/main/binary-arm/xbase-clients_4.1.0-16woody4_arm.deb
stable/main/binary-arm/lbxproxy_4.1.0-16woody4_arm.deb
stable/main/binary-arm/xfs_4.1.0-16woody4_arm.deb
stable/main/binary-arm/libxaw7_4.1.0-16woody4_arm.deb
stable/main/binary-arm/libxaw6_4.1.0-16woody4_arm.deb
stable/main/binary-arm/xutils_4.1.0-16woody4_arm.deb
stable/main/binary-arm/twm_4.1.0-16woody4_arm.deb
stable/main/binary-arm/xserver-xfree86_4.1.0-16woody4_arm.deb
stable/main/binary-arm/xlibmesa3-dbg_4.1.0-16woody4_arm.deb
stable/main/binary-arm/libxaw7-dev_4.1.0-16woody4_arm.deb
stable/main/binary-arm/xvfb_4.1.0-16woody4_arm.deb
stable/main/binary-arm/libxaw6-dev_4.1.0-16woody4_arm.deb
stable/main/binary-arm/xlibmesa-dev_4.1.0-16woody4_arm.deb
stable/main/binary-arm/xlibs-dev_4.1.0-16woody4_arm.deb
stable/main/binary-arm/xprt_4.1.0-16woody4_arm.deb
stable/main/binary-arm/xserver-common_4.1.0-16woody4_arm.deb
stable/main/binary-arm/xlibs-pic_4.1.0-16woody4_arm.deb
stable/main/binary-arm/xlibs_4.1.0-16woody4_arm.deb
stable/main/binary-arm/xlibs-dbg_4.1.0-16woody4_arm.deb
stable/main/binary-arm/libxaw6-dbg_4.1.0-16woody4_arm.deb
xfree86 (4.1.0-16woody4) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm


stable/main/binary-alpha/twm_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xlibosmesa-dev_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xmh_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xprt_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/x-window-system-core_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xlibmesa3-dbg_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xlibs_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/libxaw7_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/libxaw6_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/libxaw7-dev_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xterm_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xlibmesa-dev_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xlibs-dev_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/libxaw6-dev_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xvfb_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xlibosmesa3-dbg_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/libdps-dev_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xlibs-dbg_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xnest_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/proxymngr_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/libdps1-dbg_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xserver-common_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xlibs-pic_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xlibmesa3_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xdm_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xserver-xfree86_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xfwp_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/lbxproxy_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/libdps1_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xlibosmesa3_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/libxaw6-dbg_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xbase-clients_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/libxaw7-dbg_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xfs_4.1.0-16woody4_alpha.deb
stable/main/binary-alpha/xutils_4.1.0-16woody4_alpha.deb
xfree86 (4.1.0-16woody4) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm


stable/main/binary-powerpc/xlibmesa3_4.1.0-16woody4_powerpc.deb
stable/main/binary-all/xlib6g-dev_4.1.0-16woody4_all.deb
stable/main/binary-powerpc/libxaw6-dbg_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/xlibs_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/xterm_4.1.0-16woody4_powerpc.deb
stable/main/binary-all/xspecs_4.1.0-16woody4_all.deb
stable/main/binary-powerpc/libxaw7-dbg_4.1.0-16woody4_powerpc.deb
stable/main/binary-all/xfonts-pex_4.1.0-16woody4_all.deb
stable/main/binary-powerpc/xserver-xfree86_4.1.0-16woody4_powerpc.deb
stable/main/binary-all/xfonts-scalable_4.1.0-16woody4_all.deb
stable/main/binary-powerpc/twm_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/libxaw7_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/libdps-dev_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/xvfb_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/xlibosmesa-dev_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/xutils_4.1.0-16woody4_powerpc.deb
stable/main/binary-all/xfonts-base_4.1.0-16woody4_all.deb
stable/main/binary-powerpc/x-window-system-core_4.1.0-16woody4_powerpc.deb
stable/main/binary-all/xfonts-75dpi-transcoded_4.1.0-16woody4_all.deb
stable/main/binary-powerpc/libxaw7-dev_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/libdps1_4.1.0-16woody4_powerpc.deb
stable/main/binary-all/xlib6g_4.1.0-16woody4_all.deb
stable/main/binary-powerpc/xdm_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/xnest_4.1.0-16woody4_powerpc.deb
stable/main/source/xfree86_4.1.0-16woody4.dsc
stable/main/binary-all/xfonts-75dpi_4.1.0-16woody4_all.deb
stable/main/binary-powerpc/xlibs-pic_4.1.0-16woody4_powerpc.deb
stable/main/binary-all/xfree86-common_4.1.0-16woody4_all.deb
stable/main/binary-all/xfonts-cyrillic_4.1.0-16woody4_all.deb
stable/main/binary-powerpc/libxaw6-dev_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/xlibmesa-dev_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/xprt_4.1.0-16woody4_powerpc.deb
stable/main/binary-all/xfonts-100dpi_4.1.0-16woody4_all.deb
stable/main/binary-powerpc/xlibs-dev_4.1.0-16woody4_powerpc.deb
stable/main/binary-all/x-window-system_4.1.0-16woody4_all.deb
stable/main/binary-powerpc/xbase-clients_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/libxaw6_4.1.0-16woody4_powerpc.deb
stable/main/binary-all/xfonts-base-transcoded_4.1.0-16woody4_all.deb
stable/main/binary-powerpc/xfs_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/libdps1-dbg_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/xfwp_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/xlibs-dbg_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/xlibosmesa3-dbg_4.1.0-16woody4_powerpc.deb
stable/main/source/xfree86_4.1.0-16woody4.diff.gz
stable/main/binary-powerpc/proxymngr_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/xlibosmesa3_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/xmh_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/lbxproxy_4.1.0-16woody4_powerpc.deb
stable/main/binary-all/xfonts-100dpi-transcoded_4.1.0-16woody4_all.deb
stable/main/binary-powerpc/xlibmesa3-dbg_4.1.0-16woody4_powerpc.deb
stable/main/binary-powerpc/xserver-common_4.1.0-16woody4_powerpc.deb
xfree86 (4.1.0-16woody4) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm


stable/main/binary-sparc/xconq_7.4.1-2woody2_sparc.deb
xconq (7.4.1-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows with long USER and DISPLAY environment variables
    (CAN-2003-0607)


stable/main/binary-s390/xconq_7.4.1-2woody2_s390.deb
xconq (7.4.1-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows with long USER and DISPLAY environment variables
    (CAN-2003-0607)


stable/main/binary-powerpc/xconq_7.4.1-2woody2_powerpc.deb
xconq (7.4.1-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows with long USER and DISPLAY environment variables
    (CAN-2003-0607)


stable/main/binary-mipsel/xconq_7.4.1-2woody2_mipsel.deb
xconq (7.4.1-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows with long USER and DISPLAY environment variables
    (CAN-2003-0607)


stable/main/binary-mips/xconq_7.4.1-2woody2_mips.deb
xconq (7.4.1-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows with long USER and DISPLAY environment variables
    (CAN-2003-0607)


stable/main/binary-m68k/xconq_7.4.1-2woody2_m68k.deb
xconq (7.4.1-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows with long USER and DISPLAY environment variables
    (CAN-2003-0607)


stable/main/binary-ia64/xconq_7.4.1-2woody2_ia64.deb
xconq (7.4.1-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows with long USER and DISPLAY environment variables
    (CAN-2003-0607)


stable/main/binary-hppa/xconq_7.4.1-2woody2_hppa.deb
xconq (7.4.1-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows with long USER and DISPLAY environment variables
    (CAN-2003-0607)


stable/main/binary-arm/xconq_7.4.1-2woody2_arm.deb
xconq (7.4.1-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows with long USER and DISPLAY environment variables
    (CAN-2003-0607)


stable/main/binary-alpha/xconq_7.4.1-2woody2_alpha.deb
xconq (7.4.1-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows with long USER and DISPLAY environment variables
    (CAN-2003-0607)


stable/main/source/xconq_7.4.1-2woody2.diff.gz
stable/main/binary-all/xconq-common_7.4.1-2woody2_all.deb
stable/main/binary-all/xconq-doc_7.4.1-2woody2_all.deb
stable/main/binary-i386/xconq_7.4.1-2woody2_i386.deb
stable/main/source/xconq_7.4.1-2woody2.dsc
xconq (7.4.1-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows with long USER and DISPLAY environment variables
    (CAN-2003-0607)


stable/main/binary-sparc/xchat_1.8.9-0woody3_sparc.deb
stable/main/binary-sparc/xchat-text_1.8.9-0woody3_sparc.deb
stable/main/binary-sparc/xchat-gnome_1.8.9-0woody3_sparc.deb
xchat (1.8.9-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a remote exploit [src/common/server.c,
    CAN-2004-0409]


stable/main/binary-s390/xchat-text_1.8.9-0woody3_s390.deb
stable/main/binary-s390/xchat_1.8.9-0woody3_s390.deb
stable/main/binary-s390/xchat-gnome_1.8.9-0woody3_s390.deb
xchat (1.8.9-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a remote exploit [src/common/server.c,
    CAN-2004-0409]


stable/main/binary-powerpc/xchat-gnome_1.8.9-0woody3_powerpc.deb
stable/main/binary-powerpc/xchat_1.8.9-0woody3_powerpc.deb
stable/main/binary-powerpc/xchat-text_1.8.9-0woody3_powerpc.deb
xchat (1.8.9-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a remote exploit [src/common/server.c,
    CAN-2004-0409]


stable/main/binary-mipsel/xchat_1.8.9-0woody3_mipsel.deb
stable/main/binary-mipsel/xchat-text_1.8.9-0woody3_mipsel.deb
stable/main/binary-mipsel/xchat-gnome_1.8.9-0woody3_mipsel.deb
xchat (1.8.9-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a remote exploit [src/common/server.c,
    CAN-2004-0409]


stable/main/binary-mips/xchat-gnome_1.8.9-0woody3_mips.deb
stable/main/binary-mips/xchat-text_1.8.9-0woody3_mips.deb
stable/main/binary-mips/xchat_1.8.9-0woody3_mips.deb
xchat (1.8.9-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a remote exploit [src/common/server.c,
    CAN-2004-0409]


stable/main/binary-m68k/xchat-gnome_1.8.9-0woody3_m68k.deb
stable/main/binary-m68k/xchat_1.8.9-0woody3_m68k.deb
stable/main/binary-m68k/xchat-text_1.8.9-0woody3_m68k.deb
xchat (1.8.9-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a remote exploit [src/common/server.c,
    CAN-2004-0409]


stable/main/binary-ia64/xchat-gnome_1.8.9-0woody3_ia64.deb
stable/main/binary-ia64/xchat_1.8.9-0woody3_ia64.deb
stable/main/binary-ia64/xchat-text_1.8.9-0woody3_ia64.deb
xchat (1.8.9-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a remote exploit [src/common/server.c,
    CAN-2004-0409]


stable/main/binary-hppa/xchat-gnome_1.8.9-0woody3_hppa.deb
stable/main/binary-hppa/xchat-text_1.8.9-0woody3_hppa.deb
stable/main/binary-hppa/xchat_1.8.9-0woody3_hppa.deb
xchat (1.8.9-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a remote exploit [src/common/server.c,
    CAN-2004-0409]


stable/main/binary-arm/xchat-text_1.8.9-0woody3_arm.deb
stable/main/binary-arm/xchat-gnome_1.8.9-0woody3_arm.deb
stable/main/binary-arm/xchat_1.8.9-0woody3_arm.deb
xchat (1.8.9-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a remote exploit [src/common/server.c,
    CAN-2004-0409]


stable/main/binary-alpha/xchat-text_1.8.9-0woody3_alpha.deb
stable/main/binary-alpha/xchat-gnome_1.8.9-0woody3_alpha.deb
stable/main/binary-alpha/xchat_1.8.9-0woody3_alpha.deb
xchat (1.8.9-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a remote exploit [src/common/server.c,
    CAN-2004-0409]


stable/main/binary-i386/xchat_1.8.9-0woody3_i386.deb
stable/main/binary-all/xchat-common_1.8.9-0woody3_all.deb
stable/main/source/xchat_1.8.9-0woody3.diff.gz
stable/main/binary-i386/xchat-text_1.8.9-0woody3_i386.deb
stable/main/source/xchat_1.8.9-0woody3.dsc
stable/main/binary-i386/xchat-gnome_1.8.9-0woody3_i386.deb
xchat (1.8.9-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix a remote exploit [src/common/server.c,
    CAN-2004-0409]


stable/main/binary-sparc/xboing_2.4-26woody1_sparc.deb
xboing (2.4-26woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix buffer overflows allowing execution of arbitary code with GID(games).
    (CAN-2004-0149)


stable/main/binary-s390/xboing_2.4-26woody1_s390.deb
xboing (2.4-26woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix buffer overflows allowing execution of arbitary code with GID(games).
    (CAN-2004-0149)


stable/main/binary-powerpc/xboing_2.4-26woody1_powerpc.deb
xboing (2.4-26woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix buffer overflows allowing execution of arbitary code with GID(games).
    (CAN-2004-0149)


stable/main/binary-mipsel/xboing_2.4-26woody1_mipsel.deb
xboing (2.4-26woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix buffer overflows allowing execution of arbitary code with GID(games).
    (CAN-2004-0149)


stable/main/binary-mips/xboing_2.4-26woody1_mips.deb
xboing (2.4-26woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix buffer overflows allowing execution of arbitary code with GID(games).
    (CAN-2004-0149)


stable/main/binary-m68k/xboing_2.4-26woody1_m68k.deb
xboing (2.4-26woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix buffer overflows allowing execution of arbitary code with GID(games).
    (CAN-2004-0149)


stable/main/binary-ia64/xboing_2.4-26woody1_ia64.deb
xboing (2.4-26woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix buffer overflows allowing execution of arbitary code with GID(games).
    (CAN-2004-0149)


stable/main/binary-hppa/xboing_2.4-26woody1_hppa.deb
xboing (2.4-26woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix buffer overflows allowing execution of arbitary code with GID(games).
    (CAN-2004-0149)


stable/main/binary-arm/xboing_2.4-26woody1_arm.deb
xboing (2.4-26woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix buffer overflows allowing execution of arbitary code with GID(games).
    (CAN-2004-0149)


stable/main/binary-alpha/xboing_2.4-26woody1_alpha.deb
xboing (2.4-26woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix buffer overflows allowing execution of arbitary code with GID(games).
    (CAN-2004-0149)


stable/main/source/xboing_2.4-26woody1.diff.gz
stable/main/binary-i386/xboing_2.4-26woody1_i386.deb
stable/main/source/xboing_2.4-26woody1.dsc
xboing (2.4-26woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix buffer overflows allowing execution of arbitary code with GID(games).
    (CAN-2004-0149)


stable/main/binary-sparc/wv_0.7.1+rvt-2woody3_sparc.deb
wv (0.7.1+rvt-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dom Lachowicz to fix arbitrary command execution
    [field.c, CAN-2004-0645]


stable/main/binary-s390/wv_0.7.1+rvt-2woody3_s390.deb
wv (0.7.1+rvt-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dom Lachowicz to fix arbitrary command execution
    [field.c, CAN-2004-0645]


stable/main/binary-powerpc/wv_0.7.1+rvt-2woody3_powerpc.deb
wv (0.7.1+rvt-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dom Lachowicz to fix arbitrary command execution
    [field.c, CAN-2004-0645]


stable/main/binary-mipsel/wv_0.7.1+rvt-2woody3_mipsel.deb
wv (0.7.1+rvt-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dom Lachowicz to fix arbitrary command execution
    [field.c, CAN-2004-0645]


stable/main/binary-mips/wv_0.7.1+rvt-2woody3_mips.deb
wv (0.7.1+rvt-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dom Lachowicz to fix arbitrary command execution
    [field.c, CAN-2004-0645]


stable/main/binary-m68k/wv_0.7.1+rvt-2woody3_m68k.deb
wv (0.7.1+rvt-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dom Lachowicz to fix arbitrary command execution
    [field.c, CAN-2004-0645]


stable/main/binary-ia64/wv_0.7.1+rvt-2woody3_ia64.deb
wv (0.7.1+rvt-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dom Lachowicz to fix arbitrary command execution
    [field.c, CAN-2004-0645]


stable/main/binary-i386/wv_0.7.1+rvt-2woody3_i386.deb
wv (0.7.1+rvt-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dom Lachowicz to fix arbitrary command execution
    [field.c, CAN-2004-0645]


stable/main/binary-arm/wv_0.7.1+rvt-2woody3_arm.deb
wv (0.7.1+rvt-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dom Lachowicz to fix arbitrary command execution
    [field.c, CAN-2004-0645]


stable/main/binary-alpha/wv_0.7.1+rvt-2woody3_alpha.deb
wv (0.7.1+rvt-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dom Lachowicz to fix arbitrary command execution
    [field.c, CAN-2004-0645]


stable/main/source/wv_0.7.1+rvt-2woody3.dsc
stable/main/binary-hppa/wv_0.7.1+rvt-2woody3_hppa.deb
stable/main/source/wv_0.7.1+rvt-2woody3.diff.gz
wv (0.7.1+rvt-2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Dom Lachowicz to fix arbitrary command execution
    [field.c, CAN-2004-0645]


stable/main/binary-sparc/wu-ftpd_2.6.2-3woody4_sparc.deb
wu-ftpd (2.6.2-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch skeychallenge.patch to fix buffer overflow in
    skey_challenge (CAN-2004-0185)


stable/main/binary-s390/wu-ftpd_2.6.2-3woody4_s390.deb
wu-ftpd (2.6.2-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch skeychallenge.patch to fix buffer overflow in
    skey_challenge (CAN-2004-0185)


stable/main/binary-powerpc/wu-ftpd_2.6.2-3woody4_powerpc.deb
wu-ftpd (2.6.2-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch skeychallenge.patch to fix buffer overflow in
    skey_challenge (CAN-2004-0185)


stable/main/binary-mipsel/wu-ftpd_2.6.2-3woody4_mipsel.deb
wu-ftpd (2.6.2-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch skeychallenge.patch to fix buffer overflow in
    skey_challenge (CAN-2004-0185)


stable/main/binary-mips/wu-ftpd_2.6.2-3woody4_mips.deb
wu-ftpd (2.6.2-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch skeychallenge.patch to fix buffer overflow in
    skey_challenge (CAN-2004-0185)


stable/main/binary-m68k/wu-ftpd_2.6.2-3woody4_m68k.deb
wu-ftpd (2.6.2-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch skeychallenge.patch to fix buffer overflow in
    skey_challenge (CAN-2004-0185)


stable/main/binary-ia64/wu-ftpd_2.6.2-3woody4_ia64.deb
wu-ftpd (2.6.2-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch skeychallenge.patch to fix buffer overflow in
    skey_challenge (CAN-2004-0185)


stable/main/binary-hppa/wu-ftpd_2.6.2-3woody4_hppa.deb
wu-ftpd (2.6.2-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch skeychallenge.patch to fix buffer overflow in
    skey_challenge (CAN-2004-0185)


stable/main/binary-arm/wu-ftpd_2.6.2-3woody4_arm.deb
wu-ftpd (2.6.2-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch skeychallenge.patch to fix buffer overflow in
    skey_challenge (CAN-2004-0185)


stable/main/binary-alpha/wu-ftpd_2.6.2-3woody4_alpha.deb
wu-ftpd (2.6.2-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch skeychallenge.patch to fix buffer overflow in
    skey_challenge (CAN-2004-0185)


stable/main/source/wu-ftpd_2.6.2-3woody4.dsc
stable/main/source/wu-ftpd_2.6.2-3woody4.diff.gz
stable/main/binary-all/wu-ftpd-academ_2.6.2-3woody4_all.deb
stable/main/binary-i386/wu-ftpd_2.6.2-3woody4_i386.deb
wu-ftpd (2.6.2-3woody4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch skeychallenge.patch to fix buffer overflow in
    skey_challenge (CAN-2004-0185)


stable/main/binary-sparc/wget_1.8.1-6.1_sparc.deb
wget (1.8.1-6.1) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Fix directory traversal problem in FTP client
  * Fix buffer overrun in url_filename function


stable/main/binary-s390/wget_1.8.1-6.1_s390.deb
wget (1.8.1-6.1) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Fix directory traversal problem in FTP client
  * Fix buffer overrun in url_filename function


stable/main/binary-powerpc/wget_1.8.1-6.1_powerpc.deb
wget (1.8.1-6.1) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Fix directory traversal problem in FTP client
  * Fix buffer overrun in url_filename function


stable/main/binary-mipsel/wget_1.8.1-6.1_mipsel.deb
wget (1.8.1-6.1) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Fix directory traversal problem in FTP client
  * Fix buffer overrun in url_filename function


stable/main/binary-mips/wget_1.8.1-6.1_mips.deb
wget (1.8.1-6.1) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Fix directory traversal problem in FTP client
  * Fix buffer overrun in url_filename function


stable/main/binary-m68k/wget_1.8.1-6.1_m68k.deb
wget (1.8.1-6.1) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Fix directory traversal problem in FTP client
  * Fix buffer overrun in url_filename function


stable/main/binary-ia64/wget_1.8.1-6.1_ia64.deb
wget (1.8.1-6.1) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Fix directory traversal problem in FTP client
  * Fix buffer overrun in url_filename function


stable/main/binary-hppa/wget_1.8.1-6.1_hppa.deb
wget (1.8.1-6.1) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Fix directory traversal problem in FTP client
  * Fix buffer overrun in url_filename function


stable/main/binary-arm/wget_1.8.1-6.1_arm.deb
wget (1.8.1-6.1) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Fix directory traversal problem in FTP client
  * Fix buffer overrun in url_filename function


stable/main/binary-alpha/wget_1.8.1-6.1_alpha.deb
wget (1.8.1-6.1) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Fix directory traversal problem in FTP client
  * Fix buffer overrun in url_filename function


stable/main/source/wget_1.8.1-6.1.diff.gz
stable/main/binary-i386/wget_1.8.1-6.1_i386.deb
stable/main/source/wget_1.8.1-6.1.dsc
wget (1.8.1-6.1) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Fix directory traversal problem in FTP client
  * Fix buffer overrun in url_filename function


stable/main/binary-all/webmin-xinetd_0.94-7woody3_all.deb
stable/main/binary-all/webmin-lpadmin_0.94-7woody3_all.deb
stable/main/binary-all/webmin-ssl_0.94-7woody3_all.deb
stable/main/binary-all/webmin-mysql_0.94-7woody3_all.deb
stable/main/source/webmin_0.94-7woody3.dsc
stable/main/binary-all/webmin-cpan_0.94-7woody3_all.deb
stable/main/binary-all/webmin-postgresql_0.94-7woody3_all.deb
stable/main/binary-all/webmin-qmailadmin_0.94-7woody3_all.deb
stable/main/binary-all/webmin-core_0.94-7woody3_all.deb
stable/main/binary-all/webmin_0.94-7woody3_all.deb
stable/main/binary-all/webmin-software_0.94-7woody3_all.deb
stable/main/binary-all/webmin-dhcpd_0.94-7woody3_all.deb
stable/main/binary-all/webmin-fetchmail_0.94-7woody3_all.deb
stable/main/binary-all/webmin-inetd_0.94-7woody3_all.deb
stable/main/binary-all/webmin-stunnel_0.94-7woody3_all.deb
stable/main/binary-all/webmin-ppp_0.94-7woody3_all.deb
stable/main/binary-all/webmin-exports_0.94-7woody3_all.deb
stable/main/binary-all/webmin-burner_0.94-7woody3_all.deb
stable/main/binary-all/webmin-postfix_0.94-7woody3_all.deb
stable/main/binary-all/webmin-sshd_0.94-7woody3_all.deb
stable/main/binary-all/webmin-apache_0.94-7woody3_all.deb
stable/main/binary-all/webmin-cluster-useradmin_0.94-7woody3_all.deb
stable/main/binary-all/webmin-nis_0.94-7woody3_all.deb
stable/main/binary-all/webmin-jabber_0.94-7woody3_all.deb
stable/main/binary-all/webmin-samba_0.94-7woody3_all.deb
stable/main/source/webmin_0.94-7woody3.diff.gz
stable/main/binary-all/webmin-mon_0.94-7woody3_all.deb
stable/main/binary-all/webmin-wuftpd_0.94-7woody3_all.deb
stable/main/binary-all/webmin-quota_0.94-7woody3_all.deb
stable/main/binary-all/webmin-status_0.94-7woody3_all.deb
stable/main/binary-all/webmin-cluster-software_0.94-7woody3_all.deb
stable/main/binary-i386/webmin-grub_0.94-7woody3_i386.deb
stable/main/binary-all/webmin-heartbeat_0.94-7woody3_all.deb
stable/main/binary-all/webmin-raid_0.94-7woody3_all.deb
stable/main/binary-all/webmin-sendmail_0.94-7woody3_all.deb
stable/main/binary-all/webmin-bind8_0.94-7woody3_all.deb
stable/main/binary-all/webmin-squid_0.94-7woody3_all.deb
webmin (0.94-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied adjusted patch from upstream (Jamie Cameron) to fix insecure
    temporary file/directory usage [web-lib.pl, CAN-2004-0559]


stable/main/binary-sparc/vbox3_0.1.7.1_sparc.deb
vbox3 (0.1.7.1) stable; urgency=high
  * vboxgetty/voice.c: bug: permissions were not dropped accurately before
    running user-controlled tclscript; a user was able to gain root
    permissions through the tclscript. fix: fork(), setgid(), setuid() before
    running tclscript, and let main process wait for child.  See bug #218288.


stable/main/binary-s390/vbox3_0.1.7.1_s390.deb
vbox3 (0.1.7.1) stable; urgency=high
  * vboxgetty/voice.c: bug: permissions were not dropped accurately before
    running user-controlled tclscript; a user was able to gain root
    permissions through the tclscript. fix: fork(), setgid(), setuid() before
    running tclscript, and let main process wait for child.  See bug #218288.


stable/main/binary-powerpc/vbox3_0.1.7.1_powerpc.deb
vbox3 (0.1.7.1) stable; urgency=high
  * vboxgetty/voice.c: bug: permissions were not dropped accurately before
    running user-controlled tclscript; a user was able to gain root
    permissions through the tclscript. fix: fork(), setgid(), setuid() before
    running tclscript, and let main process wait for child.  See bug #218288.


stable/main/binary-mipsel/vbox3_0.1.7.1_mipsel.deb
vbox3 (0.1.7.1) stable; urgency=high
  * vboxgetty/voice.c: bug: permissions were not dropped accurately before
    running user-controlled tclscript; a user was able to gain root
    permissions through the tclscript. fix: fork(), setgid(), setuid() before
    running tclscript, and let main process wait for child.  See bug #218288.


stable/main/binary-mips/vbox3_0.1.7.1_mips.deb
vbox3 (0.1.7.1) stable; urgency=high
  * vboxgetty/voice.c: bug: permissions were not dropped accurately before
    running user-controlled tclscript; a user was able to gain root
    permissions through the tclscript. fix: fork(), setgid(), setuid() before
    running tclscript, and let main process wait for child.  See bug #218288.


stable/main/binary-m68k/vbox3_0.1.7.1_m68k.deb
vbox3 (0.1.7.1) stable; urgency=high
  * vboxgetty/voice.c: bug: permissions were not dropped accurately before
    running user-controlled tclscript; a user was able to gain root
    permissions through the tclscript. fix: fork(), setgid(), setuid() before
    running tclscript, and let main process wait for child.  See bug #218288.


stable/main/binary-ia64/vbox3_0.1.7.1_ia64.deb
vbox3 (0.1.7.1) stable; urgency=high
  * vboxgetty/voice.c: bug: permissions were not dropped accurately before
    running user-controlled tclscript; a user was able to gain root
    permissions through the tclscript. fix: fork(), setgid(), setuid() before
    running tclscript, and let main process wait for child.  See bug #218288.


stable/main/binary-hppa/vbox3_0.1.7.1_hppa.deb
vbox3 (0.1.7.1) stable; urgency=high
  * vboxgetty/voice.c: bug: permissions were not dropped accurately before
    running user-controlled tclscript; a user was able to gain root
    permissions through the tclscript. fix: fork(), setgid(), setuid() before
    running tclscript, and let main process wait for child.  See bug #218288.


stable/main/binary-arm/vbox3_0.1.7.1_arm.deb
vbox3 (0.1.7.1) stable; urgency=high
  * vboxgetty/voice.c: bug: permissions were not dropped accurately before
    running user-controlled tclscript; a user was able to gain root
    permissions through the tclscript. fix: fork(), setgid(), setuid() before
    running tclscript, and let main process wait for child.  See bug #218288.


stable/main/binary-alpha/vbox3_0.1.7.1_alpha.deb
vbox3 (0.1.7.1) stable; urgency=high
  * vboxgetty/voice.c: bug: permissions were not dropped accurately before
    running user-controlled tclscript; a user was able to gain root
    permissions through the tclscript. fix: fork(), setgid(), setuid() before
    running tclscript, and let main process wait for child.  See bug #218288.


stable/main/source/vbox3_0.1.7.1.dsc
stable/main/binary-i386/vbox3_0.1.7.1_i386.deb
stable/main/source/vbox3_0.1.7.1.tar.gz
vbox3 (0.1.7.1) stable; urgency=high
  * vboxgetty/voice.c: bug: permissions were not dropped accurately before
    running user-controlled tclscript; a user was able to gain root
    permissions through the tclscript. fix: fork(), setgid(), setuid() before
    running tclscript, and let main process wait for child.  See bug #218288.


stable/non-free/binary-all/ttf-kochi-gothic-naga10_1.0.20030809-0woody.2_all.deb
stable/non-free/source/ttf-kochi-naga10_1.0.20030809-0woody.2.dsc
stable/non-free/binary-all/ttf-kochi-mincho-naga10_1.0.20030809-0woody.2_all.deb
stable/non-free/source/ttf-kochi-naga10_1.0.20030809-0woody.2.diff.gz
ttf-kochi-naga10 (1.0.20030809-0woody.2) stable; urgency=high
  * Update some descriptions to clear license problem.


stable/main/binary-all/ttf-kochi-mincho_1.0.20030809-0woody.2_all.deb
stable/main/source/ttf-kochi_1.0.20030809-0woody.2.dsc
stable/main/source/ttf-kochi_1.0.20030809-0woody.2.diff.gz
stable/main/binary-all/ttf-kochi-gothic_1.0.20030809-0woody.2_all.deb
ttf-kochi (1.0.20030809-0woody.2) stable; urgency=high
  * Update some descriptions to clear license problem.


stable/main/binary-s390/trr19_1.0beta5-15woody1_s390.deb
trr19 (1.0beta5-15woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047)


stable/main/binary-powerpc/trr19_1.0beta5-15woody1_powerpc.deb
trr19 (1.0beta5-15woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047)


stable/main/binary-mipsel/trr19_1.0beta5-15woody1_mipsel.deb
trr19 (1.0beta5-15woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047)


stable/main/binary-mips/trr19_1.0beta5-15woody1_mips.deb
trr19 (1.0beta5-15woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047)


stable/main/binary-m68k/trr19_1.0beta5-15woody1_m68k.deb
trr19 (1.0beta5-15woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047)


stable/main/binary-ia64/trr19_1.0beta5-15woody1_ia64.deb
trr19 (1.0beta5-15woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047)


stable/main/binary-i386/trr19_1.0beta5-15woody1_i386.deb
trr19 (1.0beta5-15woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047)


stable/main/binary-hppa/trr19_1.0beta5-15woody1_hppa.deb
trr19 (1.0beta5-15woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047)


stable/main/binary-arm/trr19_1.0beta5-15woody1_arm.deb
trr19 (1.0beta5-15woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047)


stable/main/binary-alpha/trr19_1.0beta5-15woody1_alpha.deb
trr19 (1.0beta5-15woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047)


stable/main/binary-sparc/trr19_1.0beta5-15woody1_sparc.deb
stable/main/source/trr19_1.0beta5-15woody1.dsc
stable/main/source/trr19_1.0beta5-15woody1.diff.gz
trr19 (1.0beta5-15woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Steve Kemp to fix local group exploit (CAN-2004-0047)


stable/main/binary-s390/teg_0.9.2-2.1_s390.deb
teg (0.9.2-2.1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-powerpc/teg_0.9.2-2.1_powerpc.deb
teg (0.9.2-2.1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mipsel/teg_0.9.2-2.1_mipsel.deb
teg (0.9.2-2.1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mips/teg_0.9.2-2.1_mips.deb
teg (0.9.2-2.1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-m68k/teg_0.9.2-2.1_m68k.deb
teg (0.9.2-2.1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-ia64/teg_0.9.2-2.1_ia64.deb
teg (0.9.2-2.1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-i386/teg_0.9.2-2.1_i386.deb
teg (0.9.2-2.1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-hppa/teg_0.9.2-2.1_hppa.deb
teg (0.9.2-2.1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-arm/teg_0.9.2-2.1_arm.deb
teg (0.9.2-2.1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-alpha/teg_0.9.2-2.1_alpha.deb
teg (0.9.2-2.1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/source/teg_0.9.2-2.1.dsc
stable/main/binary-sparc/teg_0.9.2-2.1_sparc.deb
stable/main/source/teg_0.9.2-2.1.diff.gz
teg (0.9.2-2.1) stable; urgency=medium
  * Non-maintainer upload by the stable release manager
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-sparc/tcpdump_3.6.2-2.8_sparc.deb
tcpdump (3.6.2-2.8) stable-security; urgency=high
  * Backport changes from upstream CVS to fix ISAKMP payload handling
    denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184).
    Detailed changes (with corresponding upstream revisions):
    + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47)
    + Add data checks all over the place, change rawprint() prototype and
      add corresponding return value checks (print-isakmp.c, rev. 1.46)
    + Add missing ntohs() and change length initialization in
      isakmp_id_print(), not porting prototype changes (print-isakmp.c,
      rev. 1.45)


stable/main/binary-s390/tcpdump_3.6.2-2.8_s390.deb
tcpdump (3.6.2-2.8) stable-security; urgency=high
  * Backport changes from upstream CVS to fix ISAKMP payload handling
    denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184).
    Detailed changes (with corresponding upstream revisions):
    + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47)
    + Add data checks all over the place, change rawprint() prototype and
      add corresponding return value checks (print-isakmp.c, rev. 1.46)
    + Add missing ntohs() and change length initialization in
      isakmp_id_print(), not porting prototype changes (print-isakmp.c,
      rev. 1.45)


stable/main/binary-powerpc/tcpdump_3.6.2-2.8_powerpc.deb
tcpdump (3.6.2-2.8) stable-security; urgency=high
  * Backport changes from upstream CVS to fix ISAKMP payload handling
    denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184).
    Detailed changes (with corresponding upstream revisions):
    + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47)
    + Add data checks all over the place, change rawprint() prototype and
      add corresponding return value checks (print-isakmp.c, rev. 1.46)
    + Add missing ntohs() and change length initialization in
      isakmp_id_print(), not porting prototype changes (print-isakmp.c,
      rev. 1.45)


stable/main/binary-mipsel/tcpdump_3.6.2-2.8_mipsel.deb
tcpdump (3.6.2-2.8) stable-security; urgency=high
  * Backport changes from upstream CVS to fix ISAKMP payload handling
    denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184).
    Detailed changes (with corresponding upstream revisions):
    + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47)
    + Add data checks all over the place, change rawprint() prototype and
      add corresponding return value checks (print-isakmp.c, rev. 1.46)
    + Add missing ntohs() and change length initialization in
      isakmp_id_print(), not porting prototype changes (print-isakmp.c,
      rev. 1.45)


stable/main/binary-mips/tcpdump_3.6.2-2.8_mips.deb
tcpdump (3.6.2-2.8) stable-security; urgency=high
  * Backport changes from upstream CVS to fix ISAKMP payload handling
    denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184).
    Detailed changes (with corresponding upstream revisions):
    + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47)
    + Add data checks all over the place, change rawprint() prototype and
      add corresponding return value checks (print-isakmp.c, rev. 1.46)
    + Add missing ntohs() and change length initialization in
      isakmp_id_print(), not porting prototype changes (print-isakmp.c,
      rev. 1.45)


stable/main/binary-m68k/tcpdump_3.6.2-2.8_m68k.deb
tcpdump (3.6.2-2.8) stable-security; urgency=high
  * Backport changes from upstream CVS to fix ISAKMP payload handling
    denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184).
    Detailed changes (with corresponding upstream revisions):
    + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47)
    + Add data checks all over the place, change rawprint() prototype and
      add corresponding return value checks (print-isakmp.c, rev. 1.46)
    + Add missing ntohs() and change length initialization in
      isakmp_id_print(), not porting prototype changes (print-isakmp.c,
      rev. 1.45)


stable/main/binary-ia64/tcpdump_3.6.2-2.8_ia64.deb
tcpdump (3.6.2-2.8) stable-security; urgency=high
  * Backport changes from upstream CVS to fix ISAKMP payload handling
    denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184).
    Detailed changes (with corresponding upstream revisions):
    + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47)
    + Add data checks all over the place, change rawprint() prototype and
      add corresponding return value checks (print-isakmp.c, rev. 1.46)
    + Add missing ntohs() and change length initialization in
      isakmp_id_print(), not porting prototype changes (print-isakmp.c,
      rev. 1.45)


stable/main/binary-hppa/tcpdump_3.6.2-2.8_hppa.deb
tcpdump (3.6.2-2.8) stable-security; urgency=high
  * Backport changes from upstream CVS to fix ISAKMP payload handling
    denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184).
    Detailed changes (with corresponding upstream revisions):
    + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47)
    + Add data checks all over the place, change rawprint() prototype and
      add corresponding return value checks (print-isakmp.c, rev. 1.46)
    + Add missing ntohs() and change length initialization in
      isakmp_id_print(), not porting prototype changes (print-isakmp.c,
      rev. 1.45)


stable/main/binary-arm/tcpdump_3.6.2-2.8_arm.deb
tcpdump (3.6.2-2.8) stable-security; urgency=high
  * Backport changes from upstream CVS to fix ISAKMP payload handling
    denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184).
    Detailed changes (with corresponding upstream revisions):
    + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47)
    + Add data checks all over the place, change rawprint() prototype and
      add corresponding return value checks (print-isakmp.c, rev. 1.46)
    + Add missing ntohs() and change length initialization in
      isakmp_id_print(), not porting prototype changes (print-isakmp.c,
      rev. 1.45)


stable/main/binary-alpha/tcpdump_3.6.2-2.8_alpha.deb
tcpdump (3.6.2-2.8) stable-security; urgency=high
  * Backport changes from upstream CVS to fix ISAKMP payload handling
    denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184).
    Detailed changes (with corresponding upstream revisions):
    + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47)
    + Add data checks all over the place, change rawprint() prototype and
      add corresponding return value checks (print-isakmp.c, rev. 1.46)
    + Add missing ntohs() and change length initialization in
      isakmp_id_print(), not porting prototype changes (print-isakmp.c,
      rev. 1.45)


stable/main/source/tcpdump_3.6.2-2.8.dsc
stable/main/binary-i386/tcpdump_3.6.2-2.8_i386.deb
stable/main/source/tcpdump_3.6.2-2.8.diff.gz
tcpdump (3.6.2-2.8) stable-security; urgency=high
  * Backport changes from upstream CVS to fix ISAKMP payload handling
    denial-of-service vulnerabilities (CAN-2004-0183, CAN-2004-0184).
    Detailed changes (with corresponding upstream revisions):
    + Add length checks in isakmp_id_print() (print-isakmp.c, rev. 1.47)
    + Add data checks all over the place, change rawprint() prototype and
      add corresponding return value checks (print-isakmp.c, rev. 1.46)
    + Add missing ntohs() and change length initialization in
      isakmp_id_print(), not porting prototype changes (print-isakmp.c,
      rev. 1.45)


stable/main/binary-sparc/sysstat_4.0.4-1woody2_sparc.deb
sysstat (4.0.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from Robert Luberda <robert@debian.org> to fix cases missed by
    the patch in 4.0.4-1woody1 (CAN-2004-0108)


stable/main/binary-s390/sysstat_4.0.4-1woody2_s390.deb
sysstat (4.0.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from Robert Luberda <robert@debian.org> to fix cases missed by
    the patch in 4.0.4-1woody1 (CAN-2004-0108)


stable/main/binary-powerpc/sysstat_4.0.4-1woody2_powerpc.deb
sysstat (4.0.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from Robert Luberda <robert@debian.org> to fix cases missed by
    the patch in 4.0.4-1woody1 (CAN-2004-0108)


stable/main/binary-mipsel/sysstat_4.0.4-1woody2_mipsel.deb
sysstat (4.0.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from Robert Luberda <robert@debian.org> to fix cases missed by
    the patch in 4.0.4-1woody1 (CAN-2004-0108)


stable/main/binary-mips/sysstat_4.0.4-1woody2_mips.deb
sysstat (4.0.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from Robert Luberda <robert@debian.org> to fix cases missed by
    the patch in 4.0.4-1woody1 (CAN-2004-0108)


stable/main/binary-m68k/sysstat_4.0.4-1woody2_m68k.deb
sysstat (4.0.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from Robert Luberda <robert@debian.org> to fix cases missed by
    the patch in 4.0.4-1woody1 (CAN-2004-0108)


stable/main/binary-ia64/sysstat_4.0.4-1woody2_ia64.deb
sysstat (4.0.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from Robert Luberda <robert@debian.org> to fix cases missed by
    the patch in 4.0.4-1woody1 (CAN-2004-0108)


stable/main/binary-hppa/sysstat_4.0.4-1woody2_hppa.deb
sysstat (4.0.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from Robert Luberda <robert@debian.org> to fix cases missed by
    the patch in 4.0.4-1woody1 (CAN-2004-0108)


stable/main/binary-arm/sysstat_4.0.4-1woody2_arm.deb
sysstat (4.0.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from Robert Luberda <robert@debian.org> to fix cases missed by
    the patch in 4.0.4-1woody1 (CAN-2004-0108)


stable/main/binary-alpha/sysstat_4.0.4-1woody2_alpha.deb
sysstat (4.0.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from Robert Luberda <robert@debian.org> to fix cases missed by
    the patch in 4.0.4-1woody1 (CAN-2004-0108)


stable/main/source/sysstat_4.0.4-1woody2.dsc
stable/main/binary-all/isag_4.0.4-1woody2_all.deb
stable/main/source/sysstat_4.0.4-1woody2.diff.gz
stable/main/binary-i386/sysstat_4.0.4-1woody2_i386.deb
sysstat (4.0.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from Robert Luberda <robert@debian.org> to fix cases missed by
    the patch in 4.0.4-1woody1 (CAN-2004-0108)


stable/main/binary-sparc/synaesthesia_2.1-2.1woody1_sparc.deb
synaesthesia (2.1-2.1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix a local symlink attack which allows the creation of arbitary
    files with gid games (CAN-2004-0160) by dropping privileges when writing
    config file


stable/main/binary-s390/synaesthesia_2.1-2.1woody1_s390.deb
synaesthesia (2.1-2.1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix a local symlink attack which allows the creation of arbitary
    files with gid games (CAN-2004-0160) by dropping privileges when writing
    config file


stable/main/binary-powerpc/synaesthesia_2.1-2.1woody1_powerpc.deb
synaesthesia (2.1-2.1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix a local symlink attack which allows the creation of arbitary
    files with gid games (CAN-2004-0160) by dropping privileges when writing
    config file


stable/main/binary-mipsel/synaesthesia_2.1-2.1woody1_mipsel.deb
synaesthesia (2.1-2.1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix a local symlink attack which allows the creation of arbitary
    files with gid games (CAN-2004-0160) by dropping privileges when writing
    config file


stable/main/binary-mips/synaesthesia_2.1-2.1woody1_mips.deb
synaesthesia (2.1-2.1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix a local symlink attack which allows the creation of arbitary
    files with gid games (CAN-2004-0160) by dropping privileges when writing
    config file


stable/main/binary-m68k/synaesthesia_2.1-2.1woody1_m68k.deb
synaesthesia (2.1-2.1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix a local symlink attack which allows the creation of arbitary
    files with gid games (CAN-2004-0160) by dropping privileges when writing
    config file


stable/main/binary-ia64/synaesthesia_2.1-2.1woody1_ia64.deb
synaesthesia (2.1-2.1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix a local symlink attack which allows the creation of arbitary
    files with gid games (CAN-2004-0160) by dropping privileges when writing
    config file


stable/main/binary-hppa/synaesthesia_2.1-2.1woody1_hppa.deb
synaesthesia (2.1-2.1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix a local symlink attack which allows the creation of arbitary
    files with gid games (CAN-2004-0160) by dropping privileges when writing
    config file


stable/main/binary-arm/synaesthesia_2.1-2.1woody1_arm.deb
synaesthesia (2.1-2.1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix a local symlink attack which allows the creation of arbitary
    files with gid games (CAN-2004-0160) by dropping privileges when writing
    config file


stable/main/binary-alpha/synaesthesia_2.1-2.1woody1_alpha.deb
synaesthesia (2.1-2.1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix a local symlink attack which allows the creation of arbitary
    files with gid games (CAN-2004-0160) by dropping privileges when writing
    config file


stable/main/binary-i386/synaesthesia_2.1-2.1woody1_i386.deb
stable/main/source/synaesthesia_2.1-2.1woody1.dsc
stable/main/source/synaesthesia_2.1-2.1woody1.diff.gz
synaesthesia (2.1-2.1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix a local symlink attack which allows the creation of arbitary
    files with gid games (CAN-2004-0160) by dropping privileges when writing
    config file


stable/main/binary-sparc/super_3.16.1-1.2_sparc.deb
super (3.16.1-1.2) stable-security; urgency=high
  * Applied patch from upstream to fix format string vulnerability
    found by Max Vozeler <max@hinterhof.net>. (CAN-2004-0579)


stable/main/binary-s390/super_3.16.1-1.2_s390.deb
super (3.16.1-1.2) stable-security; urgency=high
  * Applied patch from upstream to fix format string vulnerability
    found by Max Vozeler <max@hinterhof.net>. (CAN-2004-0579)


stable/main/binary-powerpc/super_3.16.1-1.2_powerpc.deb
super (3.16.1-1.2) stable-security; urgency=high
  * Applied patch from upstream to fix format string vulnerability
    found by Max Vozeler <max@hinterhof.net>. (CAN-2004-0579)


stable/main/binary-mipsel/super_3.16.1-1.2_mipsel.deb
super (3.16.1-1.2) stable-security; urgency=high
  * Applied patch from upstream to fix format string vulnerability
    found by Max Vozeler <max@hinterhof.net>. (CAN-2004-0579)


stable/main/binary-mips/super_3.16.1-1.2_mips.deb
super (3.16.1-1.2) stable-security; urgency=high
  * Applied patch from upstream to fix format string vulnerability
    found by Max Vozeler <max@hinterhof.net>. (CAN-2004-0579)


stable/main/binary-m68k/super_3.16.1-1.2_m68k.deb
super (3.16.1-1.2) stable-security; urgency=high
  * Applied patch from upstream to fix format string vulnerability
    found by Max Vozeler <max@hinterhof.net>. (CAN-2004-0579)


stable/main/binary-ia64/super_3.16.1-1.2_ia64.deb
super (3.16.1-1.2) stable-security; urgency=high
  * Applied patch from upstream to fix format string vulnerability
    found by Max Vozeler <max@hinterhof.net>. (CAN-2004-0579)


stable/main/binary-hppa/super_3.16.1-1.2_hppa.deb
super (3.16.1-1.2) stable-security; urgency=high
  * Applied patch from upstream to fix format string vulnerability
    found by Max Vozeler <max@hinterhof.net>. (CAN-2004-0579)


stable/main/binary-arm/super_3.16.1-1.2_arm.deb
super (3.16.1-1.2) stable-security; urgency=high
  * Applied patch from upstream to fix format string vulnerability
    found by Max Vozeler <max@hinterhof.net>. (CAN-2004-0579)


stable/main/binary-alpha/super_3.16.1-1.2_alpha.deb
super (3.16.1-1.2) stable-security; urgency=high
  * Applied patch from upstream to fix format string vulnerability
    found by Max Vozeler <max@hinterhof.net>. (CAN-2004-0579)


stable/main/source/super_3.16.1-1.2.dsc
stable/main/source/super_3.16.1-1.2.diff.gz
stable/main/binary-i386/super_3.16.1-1.2_i386.deb
super (3.16.1-1.2) stable-security; urgency=high
  * Applied patch from upstream to fix format string vulnerability
    found by Max Vozeler <max@hinterhof.net>. (CAN-2004-0579)


stable/main/binary-sparc/sup_1.8-8woody2_sparc.deb
sup (1.8-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c]
    (CAN-2004-0451)
  * Run pmake twice in debian/rules; for some reason the build fails
    otherwise, possibly a pmake bug


stable/main/binary-s390/sup_1.8-8woody2_s390.deb
sup (1.8-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c]
    (CAN-2004-0451)
  * Run pmake twice in debian/rules; for some reason the build fails
    otherwise, possibly a pmake bug


stable/main/binary-powerpc/sup_1.8-8woody2_powerpc.deb
sup (1.8-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c]
    (CAN-2004-0451)
  * Run pmake twice in debian/rules; for some reason the build fails
    otherwise, possibly a pmake bug


stable/main/binary-mipsel/sup_1.8-8woody2_mipsel.deb
sup (1.8-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c]
    (CAN-2004-0451)
  * Run pmake twice in debian/rules; for some reason the build fails
    otherwise, possibly a pmake bug


stable/main/binary-mips/sup_1.8-8woody2_mips.deb
sup (1.8-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c]
    (CAN-2004-0451)
  * Run pmake twice in debian/rules; for some reason the build fails
    otherwise, possibly a pmake bug


stable/main/binary-m68k/sup_1.8-8woody2_m68k.deb
sup (1.8-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c]
    (CAN-2004-0451)
  * Run pmake twice in debian/rules; for some reason the build fails
    otherwise, possibly a pmake bug


stable/main/binary-ia64/sup_1.8-8woody2_ia64.deb
sup (1.8-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c]
    (CAN-2004-0451)
  * Run pmake twice in debian/rules; for some reason the build fails
    otherwise, possibly a pmake bug


stable/main/binary-hppa/sup_1.8-8woody2_hppa.deb
sup (1.8-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c]
    (CAN-2004-0451)
  * Run pmake twice in debian/rules; for some reason the build fails
    otherwise, possibly a pmake bug


stable/main/binary-arm/sup_1.8-8woody2_arm.deb
sup (1.8-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c]
    (CAN-2004-0451)
  * Run pmake twice in debian/rules; for some reason the build fails
    otherwise, possibly a pmake bug


stable/main/binary-alpha/sup_1.8-8woody2_alpha.deb
sup (1.8-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c]
    (CAN-2004-0451)
  * Run pmake twice in debian/rules; for some reason the build fails
    otherwise, possibly a pmake bug


stable/main/source/sup_1.8-8woody2.diff.gz
stable/main/binary-i386/sup_1.8-8woody2_i386.deb
stable/main/source/sup_1.8-8woody2.dsc
sup (1.8-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities in logquit, logerr, loginfo [log.c]
    (CAN-2004-0451)
  * Run pmake twice in debian/rules; for some reason the build fails
    otherwise, possibly a pmake bug


stable/main/binary-sparc/ssmtp_2.50.6.1_sparc.deb
ssmtp (2.50.6.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix two format string vulnerabilities (die() and log_event())
    discovered by Max Vozeler <max@hinterhof.net> (CAN-2004-0156)


stable/main/binary-s390/ssmtp_2.50.6.1_s390.deb
ssmtp (2.50.6.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix two format string vulnerabilities (die() and log_event())
    discovered by Max Vozeler <max@hinterhof.net> (CAN-2004-0156)


stable/main/binary-powerpc/ssmtp_2.50.6.1_powerpc.deb
ssmtp (2.50.6.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix two format string vulnerabilities (die() and log_event())
    discovered by Max Vozeler <max@hinterhof.net> (CAN-2004-0156)


stable/main/binary-mipsel/ssmtp_2.50.6.1_mipsel.deb
ssmtp (2.50.6.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix two format string vulnerabilities (die() and log_event())
    discovered by Max Vozeler <max@hinterhof.net> (CAN-2004-0156)


stable/main/binary-mips/ssmtp_2.50.6.1_mips.deb
ssmtp (2.50.6.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix two format string vulnerabilities (die() and log_event())
    discovered by Max Vozeler <max@hinterhof.net> (CAN-2004-0156)


stable/main/binary-m68k/ssmtp_2.50.6.1_m68k.deb
ssmtp (2.50.6.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix two format string vulnerabilities (die() and log_event())
    discovered by Max Vozeler <max@hinterhof.net> (CAN-2004-0156)


stable/main/binary-ia64/ssmtp_2.50.6.1_ia64.deb
ssmtp (2.50.6.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix two format string vulnerabilities (die() and log_event())
    discovered by Max Vozeler <max@hinterhof.net> (CAN-2004-0156)


stable/main/binary-hppa/ssmtp_2.50.6.1_hppa.deb
ssmtp (2.50.6.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix two format string vulnerabilities (die() and log_event())
    discovered by Max Vozeler <max@hinterhof.net> (CAN-2004-0156)


stable/main/binary-arm/ssmtp_2.50.6.1_arm.deb
ssmtp (2.50.6.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix two format string vulnerabilities (die() and log_event())
    discovered by Max Vozeler <max@hinterhof.net> (CAN-2004-0156)


stable/main/binary-alpha/ssmtp_2.50.6.1_alpha.deb
ssmtp (2.50.6.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix two format string vulnerabilities (die() and log_event())
    discovered by Max Vozeler <max@hinterhof.net> (CAN-2004-0156)


stable/main/source/ssmtp_2.50.6.1.tar.gz
stable/main/binary-i386/ssmtp_2.50.6.1_i386.deb
stable/main/source/ssmtp_2.50.6.1.dsc
ssmtp (2.50.6.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix two format string vulnerabilities (die() and log_event())
    discovered by Max Vozeler <max@hinterhof.net> (CAN-2004-0156)


stable/main/binary-all/squirrelmail_1.2.6-1.4_all.deb
stable/main/source/squirrelmail_1.2.6-1.4.diff.gz
stable/main/source/squirrelmail_1.2.6-1.4.dsc
squirrelmail (1:1.2.6-1.4) stable-security; urgency=high
  * Non-maintainer upload for security issues. Thanks to Thijs Kinkhorst for
    tracking down the 1.2.x issues
  * [CAN-2004-0521] Fix SQL injection vulnerability when using
    addressbook-in-SQL-database (Closes: #257961)
  * [CAN-2004-0519, CAN-2004-0520] Fix multiple XSS issues, some exploitable
    by incoming email (Closes: #257972)
  * [CAN-2004-0639] Backport fixes for multiple XSS issues found between 1.2.6
    and 1.2.12, some exploitable by incoming email (Closes: #257973)
  * Fix a bug preventing the Table of Contents of the Help system to be shown,
    which was introduced in the 1:1.2.6-1.1 security update.


stable/main/binary-sparc/squidclient_2.4.6-2woody2_sparc.deb
stable/main/binary-sparc/squid-cgi_2.4.6-2woody2_sparc.deb
stable/main/binary-sparc/squid_2.4.6-2woody2_sparc.deb
squid (2.4.6-2woody2) stable-security; urgency=high
  * Upload to woody-proposed-updates because of security issues.
  * Added patch to fix vulnerability allowing url_regex ACLs to be
    bypassed (CAN-2004-0189) (Closes: #240920)
      o squid-2.5.STABLE4-00.patch


stable/main/binary-s390/squid-cgi_2.4.6-2woody2_s390.deb
stable/main/binary-s390/squid_2.4.6-2woody2_s390.deb
stable/main/binary-s390/squidclient_2.4.6-2woody2_s390.deb
squid (2.4.6-2woody2) stable-security; urgency=high
  * Upload to woody-proposed-updates because of security issues.
  * Added patch to fix vulnerability allowing url_regex ACLs to be
    bypassed (CAN-2004-0189) (Closes: #240920)
      o squid-2.5.STABLE4-00.patch


stable/main/binary-powerpc/squid-cgi_2.4.6-2woody2_powerpc.deb
stable/main/binary-powerpc/squidclient_2.4.6-2woody2_powerpc.deb
stable/main/binary-powerpc/squid_2.4.6-2woody2_powerpc.deb
squid (2.4.6-2woody2) stable-security; urgency=high
  * Upload to woody-proposed-updates because of security issues.
  * Added patch to fix vulnerability allowing url_regex ACLs to be
    bypassed (CAN-2004-0189) (Closes: #240920)
      o squid-2.5.STABLE4-00.patch


stable/main/binary-mipsel/squidclient_2.4.6-2woody2_mipsel.deb
stable/main/binary-mipsel/squid_2.4.6-2woody2_mipsel.deb
stable/main/binary-mipsel/squid-cgi_2.4.6-2woody2_mipsel.deb
squid (2.4.6-2woody2) stable-security; urgency=high
  * Upload to woody-proposed-updates because of security issues.
  * Added patch to fix vulnerability allowing url_regex ACLs to be
    bypassed (CAN-2004-0189) (Closes: #240920)
      o squid-2.5.STABLE4-00.patch


stable/main/binary-mips/squid_2.4.6-2woody2_mips.deb
stable/main/binary-mips/squid-cgi_2.4.6-2woody2_mips.deb
stable/main/binary-mips/squidclient_2.4.6-2woody2_mips.deb
squid (2.4.6-2woody2) stable-security; urgency=high
  * Upload to woody-proposed-updates because of security issues.
  * Added patch to fix vulnerability allowing url_regex ACLs to be
    bypassed (CAN-2004-0189) (Closes: #240920)
      o squid-2.5.STABLE4-00.patch


stable/main/binary-m68k/squid_2.4.6-2woody2_m68k.deb
stable/main/binary-m68k/squidclient_2.4.6-2woody2_m68k.deb
stable/main/binary-m68k/squid-cgi_2.4.6-2woody2_m68k.deb
squid (2.4.6-2woody2) stable-security; urgency=high
  * Upload to woody-proposed-updates because of security issues.
  * Added patch to fix vulnerability allowing url_regex ACLs to be
    bypassed (CAN-2004-0189) (Closes: #240920)
      o squid-2.5.STABLE4-00.patch


stable/main/binary-ia64/squid-cgi_2.4.6-2woody2_ia64.deb
stable/main/binary-ia64/squidclient_2.4.6-2woody2_ia64.deb
stable/main/binary-ia64/squid_2.4.6-2woody2_ia64.deb
squid (2.4.6-2woody2) stable-security; urgency=high
  * Upload to woody-proposed-updates because of security issues.
  * Added patch to fix vulnerability allowing url_regex ACLs to be
    bypassed (CAN-2004-0189) (Closes: #240920)
      o squid-2.5.STABLE4-00.patch


stable/main/binary-hppa/squid-cgi_2.4.6-2woody2_hppa.deb
stable/main/binary-hppa/squidclient_2.4.6-2woody2_hppa.deb
stable/main/binary-hppa/squid_2.4.6-2woody2_hppa.deb
squid (2.4.6-2woody2) stable-security; urgency=high
  * Upload to woody-proposed-updates because of security issues.
  * Added patch to fix vulnerability allowing url_regex ACLs to be
    bypassed (CAN-2004-0189) (Closes: #240920)
      o squid-2.5.STABLE4-00.patch


stable/main/binary-arm/squid_2.4.6-2woody2_arm.deb
stable/main/binary-arm/squidclient_2.4.6-2woody2_arm.deb
stable/main/binary-arm/squid-cgi_2.4.6-2woody2_arm.deb
squid (2.4.6-2woody2) stable-security; urgency=high
  * Upload to woody-proposed-updates because of security issues.
  * Added patch to fix vulnerability allowing url_regex ACLs to be
    bypassed (CAN-2004-0189) (Closes: #240920)
      o squid-2.5.STABLE4-00.patch


stable/main/binary-alpha/squid-cgi_2.4.6-2woody2_alpha.deb
stable/main/binary-alpha/squid_2.4.6-2woody2_alpha.deb
stable/main/binary-alpha/squidclient_2.4.6-2woody2_alpha.deb
squid (2.4.6-2woody2) stable-security; urgency=high
  * Upload to woody-proposed-updates because of security issues.
  * Added patch to fix vulnerability allowing url_regex ACLs to be
    bypassed (CAN-2004-0189) (Closes: #240920)
      o squid-2.5.STABLE4-00.patch


stable/main/source/squid_2.4.6-2woody2.dsc
stable/main/binary-i386/squid-cgi_2.4.6-2woody2_i386.deb
stable/main/binary-i386/squid_2.4.6-2woody2_i386.deb
stable/main/binary-i386/squidclient_2.4.6-2woody2_i386.deb
stable/main/source/squid_2.4.6-2woody2.diff.gz
squid (2.4.6-2woody2) stable-security; urgency=high
  * Upload to woody-proposed-updates because of security issues.
  * Added patch to fix vulnerability allowing url_regex ACLs to be
    bypassed (CAN-2004-0189) (Closes: #240920)
      o squid-2.5.STABLE4-00.patch


stable/main/binary-sparc/spamassassin_2.20-1woody4_sparc.deb
spamassassin (2.20-1woody4) proposed-updates; urgency=low
  * Argh. Someone forgot to build 2.20-1woody3 on a woody system
    leading to incorrect versioned Recommends: on libc.
    (Closes: #222331, #222372, #222474)


stable/main/binary-s390/spamassassin_2.20-1woody4_s390.deb
spamassassin (2.20-1woody4) proposed-updates; urgency=low
  * Argh. Someone forgot to build 2.20-1woody3 on a woody system
    leading to incorrect versioned Recommends: on libc.
    (Closes: #222331, #222372, #222474)


stable/main/binary-powerpc/spamassassin_2.20-1woody4_powerpc.deb
spamassassin (2.20-1woody4) proposed-updates; urgency=low
  * Argh. Someone forgot to build 2.20-1woody3 on a woody system
    leading to incorrect versioned Recommends: on libc.
    (Closes: #222331, #222372, #222474)


stable/main/binary-mipsel/spamassassin_2.20-1woody4_mipsel.deb
spamassassin (2.20-1woody4) proposed-updates; urgency=low
  * Argh. Someone forgot to build 2.20-1woody3 on a woody system
    leading to incorrect versioned Recommends: on libc.
    (Closes: #222331, #222372, #222474)


stable/main/binary-mips/spamassassin_2.20-1woody4_mips.deb
spamassassin (2.20-1woody4) proposed-updates; urgency=low
  * Argh. Someone forgot to build 2.20-1woody3 on a woody system
    leading to incorrect versioned Recommends: on libc.
    (Closes: #222331, #222372, #222474)


stable/main/binary-m68k/spamassassin_2.20-1woody4_m68k.deb
spamassassin (2.20-1woody4) proposed-updates; urgency=low
  * Argh. Someone forgot to build 2.20-1woody3 on a woody system
    leading to incorrect versioned Recommends: on libc.
    (Closes: #222331, #222372, #222474)


stable/main/binary-ia64/spamassassin_2.20-1woody4_ia64.deb
spamassassin (2.20-1woody4) proposed-updates; urgency=low
  * Argh. Someone forgot to build 2.20-1woody3 on a woody system
    leading to incorrect versioned Recommends: on libc.
    (Closes: #222331, #222372, #222474)


stable/main/binary-hppa/spamassassin_2.20-1woody4_hppa.deb
spamassassin (2.20-1woody4) proposed-updates; urgency=low
  * Argh. Someone forgot to build 2.20-1woody3 on a woody system
    leading to incorrect versioned Recommends: on libc.
    (Closes: #222331, #222372, #222474)


stable/main/binary-arm/spamassassin_2.20-1woody4_arm.deb
spamassassin (2.20-1woody4) proposed-updates; urgency=low
  * Argh. Someone forgot to build 2.20-1woody3 on a woody system
    leading to incorrect versioned Recommends: on libc.
    (Closes: #222331, #222372, #222474)


stable/main/binary-alpha/spamassassin_2.20-1woody4_alpha.deb
spamassassin (2.20-1woody4) proposed-updates; urgency=low
  * Argh. Someone forgot to build 2.20-1woody3 on a woody system
    leading to incorrect versioned Recommends: on libc.
    (Closes: #222331, #222372, #222474)


stable/main/source/spamassassin_2.20-1woody4.dsc
stable/main/source/spamassassin_2.20-1woody4.diff.gz
stable/main/binary-i386/spamassassin_2.20-1woody4_i386.deb
spamassassin (2.20-1woody4) proposed-updates; urgency=low
  * Argh. Someone forgot to build 2.20-1woody3 on a woody system
    leading to incorrect versioned Recommends: on libc.
    (Closes: #222331, #222372, #222474)


stable/main/binary-sparc/sox_12.17.3-4woody2_sparc.deb
stable/main/binary-sparc/sox-dev_12.17.3-4woody2_sparc.deb
sox (12.17.3-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.
  * Added s390x as valid architecture since the kernel on the main S/390
    buildd was upgraded and now runs in 64bit mode.


stable/main/binary-s390/sox_12.17.3-4woody2_s390.deb
stable/main/binary-s390/sox-dev_12.17.3-4woody2_s390.deb
sox (12.17.3-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.
  * Added s390x as valid architecture since the kernel on the main S/390
    buildd was upgraded and now runs in 64bit mode.


stable/main/binary-powerpc/sox_12.17.3-4woody2_powerpc.deb
stable/main/binary-powerpc/sox-dev_12.17.3-4woody2_powerpc.deb
sox (12.17.3-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.
  * Added s390x as valid architecture since the kernel on the main S/390
    buildd was upgraded and now runs in 64bit mode.


stable/main/binary-mipsel/sox_12.17.3-4woody2_mipsel.deb
stable/main/binary-mipsel/sox-dev_12.17.3-4woody2_mipsel.deb
sox (12.17.3-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.
  * Added s390x as valid architecture since the kernel on the main S/390
    buildd was upgraded and now runs in 64bit mode.


stable/main/binary-mips/sox_12.17.3-4woody2_mips.deb
stable/main/binary-mips/sox-dev_12.17.3-4woody2_mips.deb
sox (12.17.3-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.
  * Added s390x as valid architecture since the kernel on the main S/390
    buildd was upgraded and now runs in 64bit mode.


stable/main/binary-m68k/sox-dev_12.17.3-4woody2_m68k.deb
stable/main/binary-m68k/sox_12.17.3-4woody2_m68k.deb
sox (12.17.3-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.
  * Added s390x as valid architecture since the kernel on the main S/390
    buildd was upgraded and now runs in 64bit mode.


stable/main/binary-ia64/sox_12.17.3-4woody2_ia64.deb
stable/main/binary-ia64/sox-dev_12.17.3-4woody2_ia64.deb
sox (12.17.3-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.
  * Added s390x as valid architecture since the kernel on the main S/390
    buildd was upgraded and now runs in 64bit mode.


stable/main/binary-hppa/sox_12.17.3-4woody2_hppa.deb
stable/main/binary-hppa/sox-dev_12.17.3-4woody2_hppa.deb
sox (12.17.3-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.
  * Added s390x as valid architecture since the kernel on the main S/390
    buildd was upgraded and now runs in 64bit mode.


stable/main/binary-arm/sox-dev_12.17.3-4woody2_arm.deb
stable/main/binary-arm/sox_12.17.3-4woody2_arm.deb
sox (12.17.3-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.
  * Added s390x as valid architecture since the kernel on the main S/390
    buildd was upgraded and now runs in 64bit mode.


stable/main/binary-alpha/sox-dev_12.17.3-4woody2_alpha.deb
stable/main/binary-alpha/sox_12.17.3-4woody2_alpha.deb
sox (12.17.3-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.
  * Added s390x as valid architecture since the kernel on the main S/390
    buildd was upgraded and now runs in 64bit mode.


stable/main/source/sox_12.17.3-4woody2.dsc
stable/main/binary-i386/sox-dev_12.17.3-4woody2_i386.deb
stable/main/source/sox_12.17.3-4woody2.diff.gz
stable/main/binary-i386/sox_12.17.3-4woody2_i386.deb
sox (12.17.3-4woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.
  * Added s390x as valid architecture since the kernel on the main S/390
    buildd was upgraded and now runs in 64bit mode.


stable/main/binary-sparc/sendmail_8.12.3-7.1_sparc.deb
stable/main/binary-sparc/libmilter-dev_8.12.3-7.1_sparc.deb
sendmail (8.12.3-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to not use default settings for the sasldb
    [debian/local/update_auth.in, CAN-2004-0833]


stable/main/binary-s390/libmilter-dev_8.12.3-7.1_s390.deb
stable/main/binary-s390/sendmail_8.12.3-7.1_s390.deb
sendmail (8.12.3-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to not use default settings for the sasldb
    [debian/local/update_auth.in, CAN-2004-0833]


stable/main/binary-powerpc/sendmail_8.12.3-7.1_powerpc.deb
stable/main/binary-powerpc/libmilter-dev_8.12.3-7.1_powerpc.deb
sendmail (8.12.3-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to not use default settings for the sasldb
    [debian/local/update_auth.in, CAN-2004-0833]


stable/main/binary-mipsel/libmilter-dev_8.12.3-7.1_mipsel.deb
stable/main/binary-mipsel/sendmail_8.12.3-7.1_mipsel.deb
sendmail (8.12.3-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to not use default settings for the sasldb
    [debian/local/update_auth.in, CAN-2004-0833]


stable/main/binary-mips/libmilter-dev_8.12.3-7.1_mips.deb
stable/main/binary-mips/sendmail_8.12.3-7.1_mips.deb
sendmail (8.12.3-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to not use default settings for the sasldb
    [debian/local/update_auth.in, CAN-2004-0833]


stable/main/binary-m68k/sendmail_8.12.3-7.1_m68k.deb
stable/main/binary-m68k/libmilter-dev_8.12.3-7.1_m68k.deb
sendmail (8.12.3-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to not use default settings for the sasldb
    [debian/local/update_auth.in, CAN-2004-0833]


stable/main/binary-ia64/libmilter-dev_8.12.3-7.1_ia64.deb
stable/main/binary-ia64/sendmail_8.12.3-7.1_ia64.deb
sendmail (8.12.3-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to not use default settings for the sasldb
    [debian/local/update_auth.in, CAN-2004-0833]


stable/main/binary-hppa/libmilter-dev_8.12.3-7.1_hppa.deb
stable/main/binary-hppa/sendmail_8.12.3-7.1_hppa.deb
sendmail (8.12.3-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to not use default settings for the sasldb
    [debian/local/update_auth.in, CAN-2004-0833]


stable/main/binary-arm/libmilter-dev_8.12.3-7.1_arm.deb
stable/main/binary-arm/sendmail_8.12.3-7.1_arm.deb
sendmail (8.12.3-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to not use default settings for the sasldb
    [debian/local/update_auth.in, CAN-2004-0833]


stable/main/binary-alpha/libmilter-dev_8.12.3-7.1_alpha.deb
stable/main/binary-alpha/sendmail_8.12.3-7.1_alpha.deb
sendmail (8.12.3-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to not use default settings for the sasldb
    [debian/local/update_auth.in, CAN-2004-0833]


stable/main/binary-i386/sendmail_8.12.3-7.1_i386.deb
stable/main/binary-i386/libmilter-dev_8.12.3-7.1_i386.deb
stable/main/binary-all/sendmail-doc_8.12.3-7.1_all.deb
stable/main/source/sendmail_8.12.3-7.1.dsc
stable/main/source/sendmail_8.12.3-7.1.diff.gz
sendmail (8.12.3-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Corrected the patch to not use default settings for the sasldb
    [debian/local/update_auth.in, CAN-2004-0833]


stable/non-free/binary-sparc/scsh_0.6.0-2woody1_sparc.deb
scsh (0.6.0-2woody1) stable; urgency=low
  * Updated debian/copyright: removed confusing claim about license
    being DFSG compliant, added some copyright notices.
  * Sponsored upload done by Joost van Baal <joostvb@debian.org>.


stable/non-free/binary-s390/scsh_0.6.0-2woody1_s390.deb
scsh (0.6.0-2woody1) stable; urgency=low
  * Updated debian/copyright: removed confusing claim about license
    being DFSG compliant, added some copyright notices.
  * Sponsored upload done by Joost van Baal <joostvb@debian.org>.


stable/non-free/binary-powerpc/scsh_0.6.0-2woody1_powerpc.deb
scsh (0.6.0-2woody1) stable; urgency=low
  * Updated debian/copyright: removed confusing claim about license
    being DFSG compliant, added some copyright notices.
  * Sponsored upload done by Joost van Baal <joostvb@debian.org>.


stable/non-free/binary-mipsel/scsh_0.6.0-2woody1_mipsel.deb
scsh (0.6.0-2woody1) stable; urgency=low
  * Updated debian/copyright: removed confusing claim about license
    being DFSG compliant, added some copyright notices.
  * Sponsored upload done by Joost van Baal <joostvb@debian.org>.


stable/non-free/binary-mips/scsh_0.6.0-2woody1_mips.deb
scsh (0.6.0-2woody1) stable; urgency=low
  * Updated debian/copyright: removed confusing claim about license
    being DFSG compliant, added some copyright notices.
  * Sponsored upload done by Joost van Baal <joostvb@debian.org>.


stable/non-free/binary-m68k/scsh_0.6.0-2woody1_m68k.deb
scsh (0.6.0-2woody1) stable; urgency=low
  * Updated debian/copyright: removed confusing claim about license
    being DFSG compliant, added some copyright notices.
  * Sponsored upload done by Joost van Baal <joostvb@debian.org>.


stable/non-free/binary-hppa/scsh_0.6.0-2woody1_hppa.deb
scsh (0.6.0-2woody1) stable; urgency=low
  * Updated debian/copyright: removed confusing claim about license
    being DFSG compliant, added some copyright notices.
  * Sponsored upload done by Joost van Baal <joostvb@debian.org>.


stable/non-free/binary-arm/scsh_0.6.0-2woody1_arm.deb
scsh (0.6.0-2woody1) stable; urgency=low
  * Updated debian/copyright: removed confusing claim about license
    being DFSG compliant, added some copyright notices.
  * Sponsored upload done by Joost van Baal <joostvb@debian.org>.


stable/non-free/source/scsh_0.6.0-2woody1.dsc
stable/non-free/binary-i386/scsh_0.6.0-2woody1_i386.deb
stable/non-free/source/scsh_0.6.0-2woody1.diff.gz
scsh (0.6.0-2woody1) stable; urgency=low
  * Updated debian/copyright: removed confusing claim about license
    being DFSG compliant, added some copyright notices.
  * Sponsored upload done by Joost van Baal <joostvb@debian.org>.


stable/main/binary-sparc/screen_3.9.11-5woody1_sparc.deb
screen (3.9.11-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Timo Sirainen <tss@iki.fi> to fix buffer integer
    overflow (CAN-2003-0972)


stable/main/binary-s390/screen_3.9.11-5woody1_s390.deb
screen (3.9.11-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Timo Sirainen <tss@iki.fi> to fix buffer integer
    overflow (CAN-2003-0972)


stable/main/binary-powerpc/screen_3.9.11-5woody1_powerpc.deb
screen (3.9.11-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Timo Sirainen <tss@iki.fi> to fix buffer integer
    overflow (CAN-2003-0972)


stable/main/binary-mipsel/screen_3.9.11-5woody1_mipsel.deb
screen (3.9.11-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Timo Sirainen <tss@iki.fi> to fix buffer integer
    overflow (CAN-2003-0972)


stable/main/binary-mips/screen_3.9.11-5woody1_mips.deb
screen (3.9.11-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Timo Sirainen <tss@iki.fi> to fix buffer integer
    overflow (CAN-2003-0972)


stable/main/binary-m68k/screen_3.9.11-5woody1_m68k.deb
screen (3.9.11-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Timo Sirainen <tss@iki.fi> to fix buffer integer
    overflow (CAN-2003-0972)


stable/main/binary-ia64/screen_3.9.11-5woody1_ia64.deb
screen (3.9.11-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Timo Sirainen <tss@iki.fi> to fix buffer integer
    overflow (CAN-2003-0972)


stable/main/binary-hppa/screen_3.9.11-5woody1_hppa.deb
screen (3.9.11-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Timo Sirainen <tss@iki.fi> to fix buffer integer
    overflow (CAN-2003-0972)


stable/main/binary-arm/screen_3.9.11-5woody1_arm.deb
screen (3.9.11-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Timo Sirainen <tss@iki.fi> to fix buffer integer
    overflow (CAN-2003-0972)


stable/main/binary-alpha/screen_3.9.11-5woody1_alpha.deb
screen (3.9.11-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Timo Sirainen <tss@iki.fi> to fix buffer integer
    overflow (CAN-2003-0972)


stable/main/source/screen_3.9.11-5woody1.dsc
stable/main/source/screen_3.9.11-5woody1.diff.gz
stable/main/binary-i386/screen_3.9.11-5woody1_i386.deb
screen (3.9.11-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Timo Sirainen <tss@iki.fi> to fix buffer integer
    overflow (CAN-2003-0972)


stable/main/binary-sparc/swat_2.2.3a-14.1_sparc.deb
stable/main/binary-sparc/libsmbclient_2.2.3a-14.1_sparc.deb
stable/main/binary-sparc/smbfs_2.2.3a-14.1_sparc.deb
stable/main/binary-sparc/samba_2.2.3a-14.1_sparc.deb
stable/main/binary-sparc/samba-common_2.2.3a-14.1_sparc.deb
stable/main/binary-sparc/libsmbclient-dev_2.2.3a-14.1_sparc.deb
stable/main/binary-sparc/winbind_2.2.3a-14.1_sparc.deb
stable/main/binary-sparc/libpam-smbpass_2.2.3a-14.1_sparc.deb
stable/main/binary-sparc/smbclient_2.2.3a-14.1_sparc.deb
samba (2.2.3a-14.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Clean up patch differenced between -13 and -14


stable/main/binary-s390/libpam-smbpass_2.2.3a-14.1_s390.deb
stable/main/binary-s390/libsmbclient-dev_2.2.3a-14.1_s390.deb
stable/main/binary-s390/samba-common_2.2.3a-14.1_s390.deb
stable/main/binary-s390/smbfs_2.2.3a-14.1_s390.deb
stable/main/binary-s390/libsmbclient_2.2.3a-14.1_s390.deb
stable/main/binary-s390/smbclient_2.2.3a-14.1_s390.deb
stable/main/binary-s390/winbind_2.2.3a-14.1_s390.deb
stable/main/binary-s390/swat_2.2.3a-14.1_s390.deb
stable/main/binary-s390/samba_2.2.3a-14.1_s390.deb
samba (2.2.3a-14.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Clean up patch differenced between -13 and -14


stable/main/binary-powerpc/samba_2.2.3a-14.1_powerpc.deb
stable/main/binary-powerpc/smbfs_2.2.3a-14.1_powerpc.deb
stable/main/binary-powerpc/libpam-smbpass_2.2.3a-14.1_powerpc.deb
stable/main/binary-powerpc/samba-common_2.2.3a-14.1_powerpc.deb
stable/main/binary-powerpc/libsmbclient-dev_2.2.3a-14.1_powerpc.deb
stable/main/binary-powerpc/winbind_2.2.3a-14.1_powerpc.deb
stable/main/binary-powerpc/smbclient_2.2.3a-14.1_powerpc.deb
stable/main/binary-powerpc/swat_2.2.3a-14.1_powerpc.deb
stable/main/binary-powerpc/libsmbclient_2.2.3a-14.1_powerpc.deb
samba (2.2.3a-14.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Clean up patch differenced between -13 and -14


stable/main/binary-mipsel/samba-common_2.2.3a-14.1_mipsel.deb
stable/main/binary-mipsel/winbind_2.2.3a-14.1_mipsel.deb
stable/main/binary-mipsel/smbfs_2.2.3a-14.1_mipsel.deb
stable/main/binary-mipsel/libsmbclient-dev_2.2.3a-14.1_mipsel.deb
stable/main/binary-mipsel/libpam-smbpass_2.2.3a-14.1_mipsel.deb
stable/main/binary-mipsel/swat_2.2.3a-14.1_mipsel.deb
stable/main/binary-mipsel/smbclient_2.2.3a-14.1_mipsel.deb
stable/main/binary-mipsel/libsmbclient_2.2.3a-14.1_mipsel.deb
stable/main/binary-mipsel/samba_2.2.3a-14.1_mipsel.deb
samba (2.2.3a-14.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Clean up patch differenced between -13 and -14


stable/main/binary-mips/smbclient_2.2.3a-14.1_mips.deb
stable/main/binary-mips/swat_2.2.3a-14.1_mips.deb
stable/main/binary-mips/smbfs_2.2.3a-14.1_mips.deb
stable/main/binary-mips/samba-common_2.2.3a-14.1_mips.deb
stable/main/binary-mips/libsmbclient-dev_2.2.3a-14.1_mips.deb
stable/main/binary-mips/libpam-smbpass_2.2.3a-14.1_mips.deb
stable/main/binary-mips/winbind_2.2.3a-14.1_mips.deb
stable/main/binary-mips/samba_2.2.3a-14.1_mips.deb
stable/main/binary-mips/libsmbclient_2.2.3a-14.1_mips.deb
samba (2.2.3a-14.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Clean up patch differenced between -13 and -14


stable/main/binary-m68k/smbfs_2.2.3a-14.1_m68k.deb
stable/main/binary-m68k/samba_2.2.3a-14.1_m68k.deb
stable/main/binary-m68k/swat_2.2.3a-14.1_m68k.deb
stable/main/binary-m68k/samba-common_2.2.3a-14.1_m68k.deb
stable/main/binary-m68k/libsmbclient-dev_2.2.3a-14.1_m68k.deb
stable/main/binary-m68k/smbclient_2.2.3a-14.1_m68k.deb
stable/main/binary-m68k/winbind_2.2.3a-14.1_m68k.deb
stable/main/binary-m68k/libsmbclient_2.2.3a-14.1_m68k.deb
stable/main/binary-m68k/libpam-smbpass_2.2.3a-14.1_m68k.deb
samba (2.2.3a-14.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Clean up patch differenced between -13 and -14


stable/main/binary-ia64/smbfs_2.2.3a-14.1_ia64.deb
stable/main/binary-ia64/winbind_2.2.3a-14.1_ia64.deb
stable/main/binary-ia64/samba-common_2.2.3a-14.1_ia64.deb
stable/main/binary-ia64/libsmbclient-dev_2.2.3a-14.1_ia64.deb
stable/main/binary-ia64/smbclient_2.2.3a-14.1_ia64.deb
stable/main/binary-ia64/samba_2.2.3a-14.1_ia64.deb
stable/main/binary-ia64/libpam-smbpass_2.2.3a-14.1_ia64.deb
stable/main/binary-ia64/libsmbclient_2.2.3a-14.1_ia64.deb
stable/main/binary-ia64/swat_2.2.3a-14.1_ia64.deb
samba (2.2.3a-14.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Clean up patch differenced between -13 and -14


stable/main/binary-hppa/swat_2.2.3a-14.1_hppa.deb
stable/main/binary-hppa/smbclient_2.2.3a-14.1_hppa.deb
stable/main/binary-hppa/samba-common_2.2.3a-14.1_hppa.deb
stable/main/binary-hppa/libpam-smbpass_2.2.3a-14.1_hppa.deb
stable/main/binary-hppa/samba_2.2.3a-14.1_hppa.deb
stable/main/binary-hppa/winbind_2.2.3a-14.1_hppa.deb
stable/main/binary-hppa/libsmbclient-dev_2.2.3a-14.1_hppa.deb
stable/main/binary-hppa/libsmbclient_2.2.3a-14.1_hppa.deb
stable/main/binary-hppa/smbfs_2.2.3a-14.1_hppa.deb
samba (2.2.3a-14.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Clean up patch differenced between -13 and -14


stable/main/binary-arm/smbclient_2.2.3a-14.1_arm.deb
stable/main/binary-arm/samba_2.2.3a-14.1_arm.deb
stable/main/binary-arm/winbind_2.2.3a-14.1_arm.deb
stable/main/binary-arm/libsmbclient-dev_2.2.3a-14.1_arm.deb
stable/main/binary-arm/libpam-smbpass_2.2.3a-14.1_arm.deb
stable/main/binary-arm/libsmbclient_2.2.3a-14.1_arm.deb
stable/main/binary-arm/swat_2.2.3a-14.1_arm.deb
stable/main/binary-arm/smbfs_2.2.3a-14.1_arm.deb
stable/main/binary-arm/samba-common_2.2.3a-14.1_arm.deb
samba (2.2.3a-14.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Clean up patch differenced between -13 and -14


stable/main/binary-alpha/libsmbclient-dev_2.2.3a-14.1_alpha.deb
stable/main/binary-alpha/libpam-smbpass_2.2.3a-14.1_alpha.deb
stable/main/binary-alpha/smbclient_2.2.3a-14.1_alpha.deb
stable/main/binary-alpha/winbind_2.2.3a-14.1_alpha.deb
stable/main/binary-alpha/smbfs_2.2.3a-14.1_alpha.deb
stable/main/binary-alpha/libsmbclient_2.2.3a-14.1_alpha.deb
stable/main/binary-alpha/samba-common_2.2.3a-14.1_alpha.deb
stable/main/binary-alpha/samba_2.2.3a-14.1_alpha.deb
stable/main/binary-alpha/swat_2.2.3a-14.1_alpha.deb
samba (2.2.3a-14.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Clean up patch differenced between -13 and -14


stable/main/binary-i386/samba-common_2.2.3a-14.1_i386.deb
stable/main/binary-all/samba-doc_2.2.3a-14.1_all.deb
stable/main/binary-i386/swat_2.2.3a-14.1_i386.deb
stable/main/source/samba_2.2.3a-14.1.diff.gz
stable/main/binary-i386/libsmbclient-dev_2.2.3a-14.1_i386.deb
stable/main/source/samba_2.2.3a-14.1.dsc
stable/main/binary-i386/smbfs_2.2.3a-14.1_i386.deb
stable/main/binary-i386/winbind_2.2.3a-14.1_i386.deb
stable/main/binary-i386/libpam-smbpass_2.2.3a-14.1_i386.deb
stable/main/binary-i386/smbclient_2.2.3a-14.1_i386.deb
stable/main/binary-i386/samba_2.2.3a-14.1_i386.deb
stable/main/binary-i386/libsmbclient_2.2.3a-14.1_i386.deb
samba (2.2.3a-14.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Clean up patch differenced between -13 and -14


stable/main/binary-sparc/ruby_1.6.7-3woody3_sparc.deb
stable/main/binary-sparc/libruby_1.6.7-3woody3_sparc.deb
stable/main/binary-sparc/libcurses-ruby_1.6.7-3woody3_sparc.deb
stable/main/binary-sparc/libreadline-ruby_1.6.7-3woody3_sparc.deb
stable/main/binary-sparc/libdbm-ruby_1.6.7-3woody3_sparc.deb
stable/main/binary-sparc/libsdbm-ruby_1.6.7-3woody3_sparc.deb
stable/main/binary-sparc/libnkf-ruby_1.6.7-3woody3_sparc.deb
stable/main/binary-sparc/libsyslog-ruby_1.6.7-3woody3_sparc.deb
stable/main/binary-sparc/libtk-ruby_1.6.7-3woody3_sparc.deb
stable/main/binary-sparc/libtcltk-ruby_1.6.7-3woody3_sparc.deb
stable/main/binary-sparc/libgdbm-ruby_1.6.7-3woody3_sparc.deb
stable/main/binary-sparc/ruby-dev_1.6.7-3woody3_sparc.deb
stable/main/binary-sparc/libpty-ruby_1.6.7-3woody3_sparc.deb
ruby (1.6.7-3woody3) stable-security; urgency=high
  * fixed typo in debian/patches/810_cgi_session.patch.


stable/main/binary-s390/libdbm-ruby_1.6.7-3woody3_s390.deb
stable/main/binary-s390/libgdbm-ruby_1.6.7-3woody3_s390.deb
stable/main/binary-s390/libcurses-ruby_1.6.7-3woody3_s390.deb
stable/main/binary-s390/ruby_1.6.7-3woody3_s390.deb
stable/main/binary-s390/libreadline-ruby_1.6.7-3woody3_s390.deb
stable/main/binary-s390/libruby_1.6.7-3woody3_s390.deb
stable/main/binary-s390/libpty-ruby_1.6.7-3woody3_s390.deb
stable/main/binary-s390/libnkf-ruby_1.6.7-3woody3_s390.deb
stable/main/binary-s390/libtk-ruby_1.6.7-3woody3_s390.deb
stable/main/binary-s390/libsdbm-ruby_1.6.7-3woody3_s390.deb
stable/main/binary-s390/libsyslog-ruby_1.6.7-3woody3_s390.deb
stable/main/binary-s390/ruby-dev_1.6.7-3woody3_s390.deb
stable/main/binary-s390/libtcltk-ruby_1.6.7-3woody3_s390.deb
ruby (1.6.7-3woody3) stable-security; urgency=high
  * fixed typo in debian/patches/810_cgi_session.patch.


stable/main/binary-powerpc/ruby_1.6.7-3woody3_powerpc.deb
stable/main/binary-powerpc/ruby-dev_1.6.7-3woody3_powerpc.deb
stable/main/binary-powerpc/libtcltk-ruby_1.6.7-3woody3_powerpc.deb
stable/main/binary-powerpc/libruby_1.6.7-3woody3_powerpc.deb
stable/main/binary-powerpc/libtk-ruby_1.6.7-3woody3_powerpc.deb
stable/main/binary-powerpc/libreadline-ruby_1.6.7-3woody3_powerpc.deb
stable/main/binary-powerpc/libcurses-ruby_1.6.7-3woody3_powerpc.deb
stable/main/binary-powerpc/libsdbm-ruby_1.6.7-3woody3_powerpc.deb
stable/main/binary-powerpc/libnkf-ruby_1.6.7-3woody3_powerpc.deb
stable/main/binary-powerpc/libdbm-ruby_1.6.7-3woody3_powerpc.deb
stable/main/binary-powerpc/libgdbm-ruby_1.6.7-3woody3_powerpc.deb
stable/main/binary-powerpc/libpty-ruby_1.6.7-3woody3_powerpc.deb
stable/main/binary-powerpc/libsyslog-ruby_1.6.7-3woody3_powerpc.deb
ruby (1.6.7-3woody3) stable-security; urgency=high
  * fixed typo in debian/patches/810_cgi_session.patch.


stable/main/binary-mipsel/libtcltk-ruby_1.6.7-3woody3_mipsel.deb
stable/main/binary-mipsel/libdbm-ruby_1.6.7-3woody3_mipsel.deb
stable/main/binary-mipsel/libreadline-ruby_1.6.7-3woody3_mipsel.deb
stable/main/binary-mipsel/libnkf-ruby_1.6.7-3woody3_mipsel.deb
stable/main/binary-mipsel/ruby-dev_1.6.7-3woody3_mipsel.deb
stable/main/binary-mipsel/ruby_1.6.7-3woody3_mipsel.deb
stable/main/binary-mipsel/libgdbm-ruby_1.6.7-3woody3_mipsel.deb
stable/main/binary-mipsel/libsdbm-ruby_1.6.7-3woody3_mipsel.deb
stable/main/binary-mipsel/libpty-ruby_1.6.7-3woody3_mipsel.deb
stable/main/binary-mipsel/libtk-ruby_1.6.7-3woody3_mipsel.deb
stable/main/binary-mipsel/libruby_1.6.7-3woody3_mipsel.deb
stable/main/binary-mipsel/libsyslog-ruby_1.6.7-3woody3_mipsel.deb
stable/main/binary-mipsel/libcurses-ruby_1.6.7-3woody3_mipsel.deb
ruby (1.6.7-3woody3) stable-security; urgency=high
  * fixed typo in debian/patches/810_cgi_session.patch.


stable/main/binary-mips/libsdbm-ruby_1.6.7-3woody3_mips.deb
stable/main/binary-mips/libruby_1.6.7-3woody3_mips.deb
stable/main/binary-mips/libgdbm-ruby_1.6.7-3woody3_mips.deb
stable/main/binary-mips/libpty-ruby_1.6.7-3woody3_mips.deb
stable/main/binary-mips/libreadline-ruby_1.6.7-3woody3_mips.deb
stable/main/binary-mips/ruby-dev_1.6.7-3woody3_mips.deb
stable/main/binary-mips/libtcltk-ruby_1.6.7-3woody3_mips.deb
stable/main/binary-mips/libdbm-ruby_1.6.7-3woody3_mips.deb
stable/main/binary-mips/libtk-ruby_1.6.7-3woody3_mips.deb
stable/main/binary-mips/libcurses-ruby_1.6.7-3woody3_mips.deb
stable/main/binary-mips/ruby_1.6.7-3woody3_mips.deb
stable/main/binary-mips/libsyslog-ruby_1.6.7-3woody3_mips.deb
stable/main/binary-mips/libnkf-ruby_1.6.7-3woody3_mips.deb
ruby (1.6.7-3woody3) stable-security; urgency=high
  * fixed typo in debian/patches/810_cgi_session.patch.


stable/main/binary-m68k/libsdbm-ruby_1.6.7-3woody3_m68k.deb
stable/main/binary-m68k/ruby-dev_1.6.7-3woody3_m68k.deb
stable/main/binary-m68k/ruby_1.6.7-3woody3_m68k.deb
stable/main/binary-m68k/libruby_1.6.7-3woody3_m68k.deb
stable/main/binary-m68k/libpty-ruby_1.6.7-3woody3_m68k.deb
stable/main/binary-m68k/libnkf-ruby_1.6.7-3woody3_m68k.deb
stable/main/binary-m68k/libtcltk-ruby_1.6.7-3woody3_m68k.deb
stable/main/binary-m68k/libcurses-ruby_1.6.7-3woody3_m68k.deb
stable/main/binary-m68k/libtk-ruby_1.6.7-3woody3_m68k.deb
stable/main/binary-m68k/libsyslog-ruby_1.6.7-3woody3_m68k.deb
stable/main/binary-m68k/libgdbm-ruby_1.6.7-3woody3_m68k.deb
stable/main/binary-m68k/libreadline-ruby_1.6.7-3woody3_m68k.deb
stable/main/binary-m68k/libdbm-ruby_1.6.7-3woody3_m68k.deb
ruby (1.6.7-3woody3) stable-security; urgency=high
  * fixed typo in debian/patches/810_cgi_session.patch.


stable/main/binary-ia64/libgdbm-ruby_1.6.7-3woody3_ia64.deb
stable/main/binary-ia64/libpty-ruby_1.6.7-3woody3_ia64.deb
stable/main/binary-ia64/libsdbm-ruby_1.6.7-3woody3_ia64.deb
stable/main/binary-ia64/libreadline-ruby_1.6.7-3woody3_ia64.deb
stable/main/binary-ia64/libtk-ruby_1.6.7-3woody3_ia64.deb
stable/main/binary-ia64/libdbm-ruby_1.6.7-3woody3_ia64.deb
stable/main/binary-ia64/libsyslog-ruby_1.6.7-3woody3_ia64.deb
stable/main/binary-ia64/libcurses-ruby_1.6.7-3woody3_ia64.deb
stable/main/binary-ia64/libruby_1.6.7-3woody3_ia64.deb
stable/main/binary-ia64/libnkf-ruby_1.6.7-3woody3_ia64.deb
stable/main/binary-ia64/ruby_1.6.7-3woody3_ia64.deb
stable/main/binary-ia64/ruby-dev_1.6.7-3woody3_ia64.deb
stable/main/binary-ia64/libtcltk-ruby_1.6.7-3woody3_ia64.deb
ruby (1.6.7-3woody3) stable-security; urgency=high
  * fixed typo in debian/patches/810_cgi_session.patch.


stable/main/binary-hppa/libsdbm-ruby_1.6.7-3woody3_hppa.deb
stable/main/binary-hppa/libdbm-ruby_1.6.7-3woody3_hppa.deb
stable/main/binary-hppa/ruby_1.6.7-3woody3_hppa.deb
stable/main/binary-hppa/libsyslog-ruby_1.6.7-3woody3_hppa.deb
stable/main/binary-hppa/libpty-ruby_1.6.7-3woody3_hppa.deb
stable/main/binary-hppa/libtk-ruby_1.6.7-3woody3_hppa.deb
stable/main/binary-hppa/ruby-dev_1.6.7-3woody3_hppa.deb
stable/main/binary-hppa/libtcltk-ruby_1.6.7-3woody3_hppa.deb
stable/main/binary-hppa/libruby_1.6.7-3woody3_hppa.deb
stable/main/binary-hppa/libcurses-ruby_1.6.7-3woody3_hppa.deb
stable/main/binary-hppa/libnkf-ruby_1.6.7-3woody3_hppa.deb
stable/main/binary-hppa/libgdbm-ruby_1.6.7-3woody3_hppa.deb
stable/main/binary-hppa/libreadline-ruby_1.6.7-3woody3_hppa.deb
ruby (1.6.7-3woody3) stable-security; urgency=high
  * fixed typo in debian/patches/810_cgi_session.patch.


stable/main/binary-arm/libsyslog-ruby_1.6.7-3woody3_arm.deb
stable/main/binary-arm/libsdbm-ruby_1.6.7-3woody3_arm.deb
stable/main/binary-arm/libcurses-ruby_1.6.7-3woody3_arm.deb
stable/main/binary-arm/libtk-ruby_1.6.7-3woody3_arm.deb
stable/main/binary-arm/ruby_1.6.7-3woody3_arm.deb
stable/main/binary-arm/libruby_1.6.7-3woody3_arm.deb
stable/main/binary-arm/libpty-ruby_1.6.7-3woody3_arm.deb
stable/main/binary-arm/libtcltk-ruby_1.6.7-3woody3_arm.deb
stable/main/binary-arm/libnkf-ruby_1.6.7-3woody3_arm.deb
stable/main/binary-arm/ruby-dev_1.6.7-3woody3_arm.deb
stable/main/binary-arm/libdbm-ruby_1.6.7-3woody3_arm.deb
stable/main/binary-arm/libreadline-ruby_1.6.7-3woody3_arm.deb
stable/main/binary-arm/libgdbm-ruby_1.6.7-3woody3_arm.deb
ruby (1.6.7-3woody3) stable-security; urgency=high
  * fixed typo in debian/patches/810_cgi_session.patch.


stable/main/binary-alpha/libdbm-ruby_1.6.7-3woody3_alpha.deb
stable/main/binary-alpha/ruby_1.6.7-3woody3_alpha.deb
stable/main/binary-alpha/libruby_1.6.7-3woody3_alpha.deb
stable/main/binary-alpha/libgdbm-ruby_1.6.7-3woody3_alpha.deb
stable/main/binary-alpha/libpty-ruby_1.6.7-3woody3_alpha.deb
stable/main/binary-alpha/libtcltk-ruby_1.6.7-3woody3_alpha.deb
stable/main/binary-alpha/libnkf-ruby_1.6.7-3woody3_alpha.deb
stable/main/binary-alpha/libcurses-ruby_1.6.7-3woody3_alpha.deb
stable/main/binary-alpha/ruby-dev_1.6.7-3woody3_alpha.deb
stable/main/binary-alpha/libtk-ruby_1.6.7-3woody3_alpha.deb
stable/main/binary-alpha/libreadline-ruby_1.6.7-3woody3_alpha.deb
stable/main/binary-alpha/libsyslog-ruby_1.6.7-3woody3_alpha.deb
stable/main/binary-alpha/libsdbm-ruby_1.6.7-3woody3_alpha.deb
ruby (1.6.7-3woody3) stable-security; urgency=high
  * fixed typo in debian/patches/810_cgi_session.patch.


stable/main/binary-i386/libgdbm-ruby_1.6.7-3woody3_i386.deb
stable/main/binary-i386/libsyslog-ruby_1.6.7-3woody3_i386.deb
stable/main/binary-i386/libtcltk-ruby_1.6.7-3woody3_i386.deb
stable/main/source/ruby_1.6.7-3woody3.diff.gz
stable/main/binary-i386/libnkf-ruby_1.6.7-3woody3_i386.deb
stable/main/binary-all/irb_1.6.7-3woody3_all.deb
stable/main/source/ruby_1.6.7-3woody3.dsc
stable/main/binary-i386/libpty-ruby_1.6.7-3woody3_i386.deb
stable/main/binary-all/ruby-examples_1.6.7-3woody3_all.deb
stable/main/binary-i386/libreadline-ruby_1.6.7-3woody3_i386.deb
stable/main/binary-i386/libdbm-ruby_1.6.7-3woody3_i386.deb
stable/main/binary-i386/libtk-ruby_1.6.7-3woody3_i386.deb
stable/main/binary-all/ruby-elisp_1.6.7-3woody3_all.deb
stable/main/binary-i386/libruby_1.6.7-3woody3_i386.deb
stable/main/binary-i386/ruby_1.6.7-3woody3_i386.deb
stable/main/binary-i386/libsdbm-ruby_1.6.7-3woody3_i386.deb
stable/main/binary-i386/libcurses-ruby_1.6.7-3woody3_i386.deb
stable/main/binary-i386/ruby-dev_1.6.7-3woody3_i386.deb
ruby (1.6.7-3woody3) stable-security; urgency=high
  * fixed typo in debian/patches/810_cgi_session.patch.


stable/main/binary-sparc/rsync_2.5.5-0.6_sparc.deb
rsync (2.5.5-0.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to prevent unauthorised file access [util.c,
    http://samba.org/rsync/#security_aug04, Bug#265662]


stable/main/binary-s390/rsync_2.5.5-0.6_s390.deb
rsync (2.5.5-0.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to prevent unauthorised file access [util.c,
    http://samba.org/rsync/#security_aug04, Bug#265662]


stable/main/binary-powerpc/rsync_2.5.5-0.6_powerpc.deb
rsync (2.5.5-0.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to prevent unauthorised file access [util.c,
    http://samba.org/rsync/#security_aug04, Bug#265662]


stable/main/binary-mipsel/rsync_2.5.5-0.6_mipsel.deb
rsync (2.5.5-0.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to prevent unauthorised file access [util.c,
    http://samba.org/rsync/#security_aug04, Bug#265662]


stable/main/binary-mips/rsync_2.5.5-0.6_mips.deb
rsync (2.5.5-0.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to prevent unauthorised file access [util.c,
    http://samba.org/rsync/#security_aug04, Bug#265662]


stable/main/binary-m68k/rsync_2.5.5-0.6_m68k.deb
rsync (2.5.5-0.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to prevent unauthorised file access [util.c,
    http://samba.org/rsync/#security_aug04, Bug#265662]


stable/main/binary-ia64/rsync_2.5.5-0.6_ia64.deb
rsync (2.5.5-0.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to prevent unauthorised file access [util.c,
    http://samba.org/rsync/#security_aug04, Bug#265662]


stable/main/binary-i386/rsync_2.5.5-0.6_i386.deb
rsync (2.5.5-0.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to prevent unauthorised file access [util.c,
    http://samba.org/rsync/#security_aug04, Bug#265662]


stable/main/binary-hppa/rsync_2.5.5-0.6_hppa.deb
rsync (2.5.5-0.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to prevent unauthorised file access [util.c,
    http://samba.org/rsync/#security_aug04, Bug#265662]


stable/main/binary-arm/rsync_2.5.5-0.6_arm.deb
rsync (2.5.5-0.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to prevent unauthorised file access [util.c,
    http://samba.org/rsync/#security_aug04, Bug#265662]


stable/main/source/rsync_2.5.5-0.6.dsc
stable/main/binary-alpha/rsync_2.5.5-0.6_alpha.deb
stable/main/source/rsync_2.5.5-0.6.diff.gz
rsync (2.5.5-0.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to prevent unauthorised file access [util.c,
    http://samba.org/rsync/#security_aug04, Bug#265662]


stable/main/binary-sparc/pppoe_3.3-1.2_sparc.deb
rp-pppoe (3.3-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added patch by Max Vozeler <max@hinterhof.net> to ignore -D and -p
    when pppoe is not running as root to prevent a potential root
    compromise when pppoe is running setuid root [src/pppoe.c,
    CAN-2004-0564]


stable/main/binary-s390/pppoe_3.3-1.2_s390.deb
rp-pppoe (3.3-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added patch by Max Vozeler <max@hinterhof.net> to ignore -D and -p
    when pppoe is not running as root to prevent a potential root
    compromise when pppoe is running setuid root [src/pppoe.c,
    CAN-2004-0564]


stable/main/binary-powerpc/pppoe_3.3-1.2_powerpc.deb
rp-pppoe (3.3-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added patch by Max Vozeler <max@hinterhof.net> to ignore -D and -p
    when pppoe is not running as root to prevent a potential root
    compromise when pppoe is running setuid root [src/pppoe.c,
    CAN-2004-0564]


stable/main/binary-mipsel/pppoe_3.3-1.2_mipsel.deb
rp-pppoe (3.3-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added patch by Max Vozeler <max@hinterhof.net> to ignore -D and -p
    when pppoe is not running as root to prevent a potential root
    compromise when pppoe is running setuid root [src/pppoe.c,
    CAN-2004-0564]


stable/main/binary-mips/pppoe_3.3-1.2_mips.deb
rp-pppoe (3.3-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added patch by Max Vozeler <max@hinterhof.net> to ignore -D and -p
    when pppoe is not running as root to prevent a potential root
    compromise when pppoe is running setuid root [src/pppoe.c,
    CAN-2004-0564]


stable/main/binary-m68k/pppoe_3.3-1.2_m68k.deb
rp-pppoe (3.3-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added patch by Max Vozeler <max@hinterhof.net> to ignore -D and -p
    when pppoe is not running as root to prevent a potential root
    compromise when pppoe is running setuid root [src/pppoe.c,
    CAN-2004-0564]


stable/main/binary-ia64/pppoe_3.3-1.2_ia64.deb
rp-pppoe (3.3-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added patch by Max Vozeler <max@hinterhof.net> to ignore -D and -p
    when pppoe is not running as root to prevent a potential root
    compromise when pppoe is running setuid root [src/pppoe.c,
    CAN-2004-0564]


stable/main/binary-hppa/pppoe_3.3-1.2_hppa.deb
rp-pppoe (3.3-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added patch by Max Vozeler <max@hinterhof.net> to ignore -D and -p
    when pppoe is not running as root to prevent a potential root
    compromise when pppoe is running setuid root [src/pppoe.c,
    CAN-2004-0564]


stable/main/binary-arm/pppoe_3.3-1.2_arm.deb
rp-pppoe (3.3-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added patch by Max Vozeler <max@hinterhof.net> to ignore -D and -p
    when pppoe is not running as root to prevent a potential root
    compromise when pppoe is running setuid root [src/pppoe.c,
    CAN-2004-0564]


stable/main/binary-alpha/pppoe_3.3-1.2_alpha.deb
rp-pppoe (3.3-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added patch by Max Vozeler <max@hinterhof.net> to ignore -D and -p
    when pppoe is not running as root to prevent a potential root
    compromise when pppoe is running setuid root [src/pppoe.c,
    CAN-2004-0564]


stable/main/binary-i386/pppoe_3.3-1.2_i386.deb
stable/main/source/rp-pppoe_3.3-1.2.dsc
stable/main/source/rp-pppoe_3.3-1.2.diff.gz
rp-pppoe (3.3-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added patch by Max Vozeler <max@hinterhof.net> to ignore -D and -p
    when pppoe is not running as root to prevent a potential root
    compromise when pppoe is running setuid root [src/pppoe.c,
    CAN-2004-0564]


stable/main/binary-s390/rinetd_0.61-1.1_s390.deb
rinetd (0.61-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Sam Hocevar to correct array resizing (rinetd.c)


stable/main/binary-powerpc/rinetd_0.61-1.1_powerpc.deb
rinetd (0.61-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Sam Hocevar to correct array resizing (rinetd.c)


stable/main/binary-mipsel/rinetd_0.61-1.1_mipsel.deb
rinetd (0.61-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Sam Hocevar to correct array resizing (rinetd.c)


stable/main/binary-mips/rinetd_0.61-1.1_mips.deb
rinetd (0.61-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Sam Hocevar to correct array resizing (rinetd.c)


stable/main/binary-m68k/rinetd_0.61-1.1_m68k.deb
rinetd (0.61-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Sam Hocevar to correct array resizing (rinetd.c)


stable/main/binary-ia64/rinetd_0.61-1.1_ia64.deb
rinetd (0.61-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Sam Hocevar to correct array resizing (rinetd.c)


stable/main/binary-i386/rinetd_0.61-1.1_i386.deb
rinetd (0.61-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Sam Hocevar to correct array resizing (rinetd.c)


stable/main/binary-hppa/rinetd_0.61-1.1_hppa.deb
rinetd (0.61-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Sam Hocevar to correct array resizing (rinetd.c)


stable/main/binary-arm/rinetd_0.61-1.1_arm.deb
rinetd (0.61-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Sam Hocevar to correct array resizing (rinetd.c)


stable/main/binary-alpha/rinetd_0.61-1.1_alpha.deb
rinetd (0.61-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Sam Hocevar to correct array resizing (rinetd.c)


stable/main/source/rinetd_0.61-1.1.diff.gz
stable/main/binary-sparc/rinetd_0.61-1.1_sparc.deb
stable/main/source/rinetd_0.61-1.1.dsc
rinetd (0.61-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Sam Hocevar to correct array resizing (rinetd.c)


stable/main/binary-sparc/libqt3-mt-odbc_3.0.3-20020329-1woody2_sparc.deb
stable/main/binary-sparc/libqxt0_3.0.3-20020329-1woody2_sparc.deb
stable/main/binary-sparc/libqt3-mt-dev_3.0.3-20020329-1woody2_sparc.deb
stable/main/binary-sparc/libqt3-mt_3.0.3-20020329-1woody2_sparc.deb
stable/main/binary-sparc/libqt3-mysql_3.0.3-20020329-1woody2_sparc.deb
stable/main/binary-sparc/libqt3_3.0.3-20020329-1woody2_sparc.deb
stable/main/binary-sparc/libqt3-mt-mysql_3.0.3-20020329-1woody2_sparc.deb
stable/main/binary-sparc/libqt3-dev_3.0.3-20020329-1woody2_sparc.deb
stable/main/binary-sparc/qt3-tools_3.0.3-20020329-1woody2_sparc.deb
stable/main/binary-sparc/libqt3-odbc_3.0.3-20020329-1woody2_sparc.deb
qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against broken GIF DoS
    [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS
    unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed
    upstream [src/kernel/qimage.cpp, CAN-2004-0692]
  * Applied patch by Chris Evans <chris@scary.beasts.org> to fix broken
    BMP handling that can result in arbitrary code execution
    [src/kernel/qimage.cpp, CAN-2004-0691]


stable/main/binary-s390/libqt3-mt-odbc_3.0.3-20020329-1woody2_s390.deb
stable/main/binary-s390/libqt3-mt-dev_3.0.3-20020329-1woody2_s390.deb
stable/main/binary-s390/libqt3-mysql_3.0.3-20020329-1woody2_s390.deb
stable/main/binary-s390/libqt3-dev_3.0.3-20020329-1woody2_s390.deb
stable/main/binary-s390/libqxt0_3.0.3-20020329-1woody2_s390.deb
stable/main/binary-s390/libqt3-mt-mysql_3.0.3-20020329-1woody2_s390.deb
stable/main/binary-s390/libqt3-mt_3.0.3-20020329-1woody2_s390.deb
stable/main/binary-s390/libqt3-odbc_3.0.3-20020329-1woody2_s390.deb
stable/main/binary-s390/libqt3_3.0.3-20020329-1woody2_s390.deb
stable/main/binary-s390/qt3-tools_3.0.3-20020329-1woody2_s390.deb
qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against broken GIF DoS
    [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS
    unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed
    upstream [src/kernel/qimage.cpp, CAN-2004-0692]
  * Applied patch by Chris Evans <chris@scary.beasts.org> to fix broken
    BMP handling that can result in arbitrary code execution
    [src/kernel/qimage.cpp, CAN-2004-0691]


stable/main/binary-powerpc/libqt3-mt_3.0.3-20020329-1woody2_powerpc.deb
stable/main/binary-powerpc/libqt3-mt-mysql_3.0.3-20020329-1woody2_powerpc.deb
stable/main/binary-powerpc/libqt3-odbc_3.0.3-20020329-1woody2_powerpc.deb
stable/main/binary-powerpc/libqt3-dev_3.0.3-20020329-1woody2_powerpc.deb
stable/main/binary-powerpc/libqt3_3.0.3-20020329-1woody2_powerpc.deb
stable/main/binary-powerpc/libqt3-mt-odbc_3.0.3-20020329-1woody2_powerpc.deb
stable/main/binary-powerpc/libqxt0_3.0.3-20020329-1woody2_powerpc.deb
stable/main/binary-powerpc/libqt3-mysql_3.0.3-20020329-1woody2_powerpc.deb
stable/main/binary-powerpc/libqt3-mt-dev_3.0.3-20020329-1woody2_powerpc.deb
stable/main/binary-powerpc/qt3-tools_3.0.3-20020329-1woody2_powerpc.deb
qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against broken GIF DoS
    [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS
    unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed
    upstream [src/kernel/qimage.cpp, CAN-2004-0692]
  * Applied patch by Chris Evans <chris@scary.beasts.org> to fix broken
    BMP handling that can result in arbitrary code execution
    [src/kernel/qimage.cpp, CAN-2004-0691]


stable/main/binary-mipsel/qt3-tools_3.0.3-20020329-1woody2_mipsel.deb
stable/main/binary-mipsel/libqt3-mt-odbc_3.0.3-20020329-1woody2_mipsel.deb
stable/main/binary-mipsel/libqt3-mysql_3.0.3-20020329-1woody2_mipsel.deb
stable/main/binary-mipsel/libqxt0_3.0.3-20020329-1woody2_mipsel.deb
stable/main/binary-mipsel/libqt3-dev_3.0.3-20020329-1woody2_mipsel.deb
stable/main/binary-mipsel/libqt3-mt_3.0.3-20020329-1woody2_mipsel.deb
stable/main/binary-mipsel/libqt3_3.0.3-20020329-1woody2_mipsel.deb
stable/main/binary-mipsel/libqt3-mt-dev_3.0.3-20020329-1woody2_mipsel.deb
stable/main/binary-mipsel/libqt3-odbc_3.0.3-20020329-1woody2_mipsel.deb
stable/main/binary-mipsel/libqt3-mt-mysql_3.0.3-20020329-1woody2_mipsel.deb
qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against broken GIF DoS
    [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS
    unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed
    upstream [src/kernel/qimage.cpp, CAN-2004-0692]
  * Applied patch by Chris Evans <chris@scary.beasts.org> to fix broken
    BMP handling that can result in arbitrary code execution
    [src/kernel/qimage.cpp, CAN-2004-0691]


stable/main/binary-mips/libqt3-dev_3.0.3-20020329-1woody2_mips.deb
stable/main/binary-mips/qt3-tools_3.0.3-20020329-1woody2_mips.deb
stable/main/binary-mips/libqt3-mt-dev_3.0.3-20020329-1woody2_mips.deb
stable/main/binary-mips/libqt3_3.0.3-20020329-1woody2_mips.deb
stable/main/binary-mips/libqt3-mt_3.0.3-20020329-1woody2_mips.deb
stable/main/binary-mips/libqt3-odbc_3.0.3-20020329-1woody2_mips.deb
stable/main/binary-mips/libqxt0_3.0.3-20020329-1woody2_mips.deb
stable/main/binary-mips/libqt3-mt-odbc_3.0.3-20020329-1woody2_mips.deb
stable/main/binary-mips/libqt3-mysql_3.0.3-20020329-1woody2_mips.deb
stable/main/binary-mips/libqt3-mt-mysql_3.0.3-20020329-1woody2_mips.deb
qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against broken GIF DoS
    [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS
    unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed
    upstream [src/kernel/qimage.cpp, CAN-2004-0692]
  * Applied patch by Chris Evans <chris@scary.beasts.org> to fix broken
    BMP handling that can result in arbitrary code execution
    [src/kernel/qimage.cpp, CAN-2004-0691]


stable/main/binary-m68k/libqt3-dev_3.0.3-20020329-1woody2_m68k.deb
stable/main/binary-m68k/libqt3-mt_3.0.3-20020329-1woody2_m68k.deb
stable/main/binary-m68k/libqt3-mt-dev_3.0.3-20020329-1woody2_m68k.deb
stable/main/binary-m68k/libqt3-mt-odbc_3.0.3-20020329-1woody2_m68k.deb
stable/main/binary-m68k/qt3-tools_3.0.3-20020329-1woody2_m68k.deb
stable/main/binary-m68k/libqxt0_3.0.3-20020329-1woody2_m68k.deb
stable/main/binary-m68k/libqt3-mysql_3.0.3-20020329-1woody2_m68k.deb
stable/main/binary-m68k/libqt3_3.0.3-20020329-1woody2_m68k.deb
stable/main/binary-m68k/libqt3-odbc_3.0.3-20020329-1woody2_m68k.deb
stable/main/binary-m68k/libqt3-mt-mysql_3.0.3-20020329-1woody2_m68k.deb
qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against broken GIF DoS
    [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS
    unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed
    upstream [src/kernel/qimage.cpp, CAN-2004-0692]
  * Applied patch by Chris Evans <chris@scary.beasts.org> to fix broken
    BMP handling that can result in arbitrary code execution
    [src/kernel/qimage.cpp, CAN-2004-0691]


stable/main/binary-ia64/qt3-tools_3.0.3-20020329-1woody2_ia64.deb
stable/main/binary-ia64/libqt3-mt-odbc_3.0.3-20020329-1woody2_ia64.deb
stable/main/binary-ia64/libqt3-odbc_3.0.3-20020329-1woody2_ia64.deb
stable/main/binary-ia64/libqt3_3.0.3-20020329-1woody2_ia64.deb
stable/main/binary-ia64/libqt3-mt-dev_3.0.3-20020329-1woody2_ia64.deb
stable/main/binary-ia64/libqt3-mysql_3.0.3-20020329-1woody2_ia64.deb
stable/main/binary-ia64/libqxt0_3.0.3-20020329-1woody2_ia64.deb
stable/main/binary-ia64/libqt3-mt-mysql_3.0.3-20020329-1woody2_ia64.deb
stable/main/binary-ia64/libqt3-dev_3.0.3-20020329-1woody2_ia64.deb
stable/main/binary-ia64/libqt3-mt_3.0.3-20020329-1woody2_ia64.deb
qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against broken GIF DoS
    [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS
    unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed
    upstream [src/kernel/qimage.cpp, CAN-2004-0692]
  * Applied patch by Chris Evans <chris@scary.beasts.org> to fix broken
    BMP handling that can result in arbitrary code execution
    [src/kernel/qimage.cpp, CAN-2004-0691]


stable/main/binary-i386/libqt3-mt-mysql_3.0.3-20020329-1woody2_i386.deb
stable/main/binary-i386/libqt3-dev_3.0.3-20020329-1woody2_i386.deb
stable/main/binary-i386/qt3-tools_3.0.3-20020329-1woody2_i386.deb
stable/main/binary-i386/libqt3-mysql_3.0.3-20020329-1woody2_i386.deb
stable/main/binary-i386/libqxt0_3.0.3-20020329-1woody2_i386.deb
stable/main/binary-i386/libqt3-mt_3.0.3-20020329-1woody2_i386.deb
stable/main/binary-i386/libqt3_3.0.3-20020329-1woody2_i386.deb
stable/main/binary-i386/libqt3-mt-dev_3.0.3-20020329-1woody2_i386.deb
stable/main/binary-i386/libqt3-mt-odbc_3.0.3-20020329-1woody2_i386.deb
stable/main/binary-i386/libqt3-odbc_3.0.3-20020329-1woody2_i386.deb
qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against broken GIF DoS
    [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS
    unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed
    upstream [src/kernel/qimage.cpp, CAN-2004-0692]
  * Applied patch by Chris Evans <chris@scary.beasts.org> to fix broken
    BMP handling that can result in arbitrary code execution
    [src/kernel/qimage.cpp, CAN-2004-0691]


stable/main/binary-hppa/libqt3-mt-odbc_3.0.3-20020329-1woody2_hppa.deb
stable/main/binary-hppa/libqt3_3.0.3-20020329-1woody2_hppa.deb
stable/main/binary-hppa/libqt3-odbc_3.0.3-20020329-1woody2_hppa.deb
stable/main/binary-hppa/libqxt0_3.0.3-20020329-1woody2_hppa.deb
stable/main/binary-hppa/libqt3-dev_3.0.3-20020329-1woody2_hppa.deb
stable/main/binary-hppa/libqt3-mt_3.0.3-20020329-1woody2_hppa.deb
stable/main/binary-hppa/libqt3-mysql_3.0.3-20020329-1woody2_hppa.deb
stable/main/binary-hppa/qt3-tools_3.0.3-20020329-1woody2_hppa.deb
stable/main/binary-hppa/libqt3-mt-dev_3.0.3-20020329-1woody2_hppa.deb
stable/main/binary-hppa/libqt3-mt-mysql_3.0.3-20020329-1woody2_hppa.deb
qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against broken GIF DoS
    [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS
    unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed
    upstream [src/kernel/qimage.cpp, CAN-2004-0692]
  * Applied patch by Chris Evans <chris@scary.beasts.org> to fix broken
    BMP handling that can result in arbitrary code execution
    [src/kernel/qimage.cpp, CAN-2004-0691]


stable/main/binary-arm/libqt3-mt-mysql_3.0.3-20020329-1woody2_arm.deb
stable/main/binary-arm/libqt3-odbc_3.0.3-20020329-1woody2_arm.deb
stable/main/binary-arm/libqt3-mt_3.0.3-20020329-1woody2_arm.deb
stable/main/binary-arm/qt3-tools_3.0.3-20020329-1woody2_arm.deb
stable/main/binary-arm/libqt3-mt-dev_3.0.3-20020329-1woody2_arm.deb
stable/main/binary-arm/libqt3-mt-odbc_3.0.3-20020329-1woody2_arm.deb
stable/main/binary-arm/libqt3-mysql_3.0.3-20020329-1woody2_arm.deb
stable/main/binary-arm/libqt3_3.0.3-20020329-1woody2_arm.deb
stable/main/binary-arm/libqt3-dev_3.0.3-20020329-1woody2_arm.deb
stable/main/binary-arm/libqxt0_3.0.3-20020329-1woody2_arm.deb
qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against broken GIF DoS
    [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS
    unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed
    upstream [src/kernel/qimage.cpp, CAN-2004-0692]
  * Applied patch by Chris Evans <chris@scary.beasts.org> to fix broken
    BMP handling that can result in arbitrary code execution
    [src/kernel/qimage.cpp, CAN-2004-0691]


stable/main/binary-alpha/libqxt0_3.0.3-20020329-1woody2_alpha.deb
stable/main/source/qt-copy_3.0.3-20020329-1woody2.dsc
stable/main/binary-alpha/libqt3-dev_3.0.3-20020329-1woody2_alpha.deb
stable/main/binary-alpha/libqt3-mt_3.0.3-20020329-1woody2_alpha.deb
stable/main/binary-all/qt3-doc_3.0.3-20020329-1woody2_all.deb
stable/main/binary-alpha/qt3-tools_3.0.3-20020329-1woody2_alpha.deb
stable/main/binary-alpha/libqt3-mysql_3.0.3-20020329-1woody2_alpha.deb
stable/main/binary-alpha/libqt3_3.0.3-20020329-1woody2_alpha.deb
stable/main/binary-alpha/libqt3-mt-odbc_3.0.3-20020329-1woody2_alpha.deb
stable/main/binary-alpha/libqt3-mt-mysql_3.0.3-20020329-1woody2_alpha.deb
stable/main/binary-alpha/libqt3-mt-dev_3.0.3-20020329-1woody2_alpha.deb
stable/main/binary-alpha/libqt3-odbc_3.0.3-20020329-1woody2_alpha.deb
stable/main/source/qt-copy_3.0.3-20020329-1woody2.diff.gz
qt-copy (2:3.0.3-20020329-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against broken GIF DoS
    [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch forwarded by Marcus Meissner to fix broken GIF DoS
    unfixed upstream [src/kernel/qasyncimageio.cpp, CAN-2004-0693]
  * Applied patch from Marcus Meissner to fix broken XPM DoS not yet fixed
    upstream [src/kernel/qimage.cpp, CAN-2004-0692]
  * Applied patch by Chris Evans <chris@scary.beasts.org> to fix broken
    BMP handling that can result in arbitrary code execution
    [src/kernel/qimage.cpp, CAN-2004-0691]


stable/main/binary-sparc/python2.2-mpz_2.2.1-4.6_sparc.deb
stable/main/binary-sparc/python2.2_2.2.1-4.6_sparc.deb
stable/main/binary-sparc/python2.2-gdbm_2.2.1-4.6_sparc.deb
stable/main/binary-sparc/python2.2-dev_2.2.1-4.6_sparc.deb
stable/main/binary-sparc/python2.2-xmlbase_2.2.1-4.6_sparc.deb
stable/main/binary-sparc/python2.2-tk_2.2.1-4.6_sparc.deb
python2.2 (2.2.1-4.6) stable-security; urgency=high
  * Revert patch suggested for #248946. Closes: #269548.
  * Apply upstream patch to fix #248946.
  * Note: In previous security updates, ipv6 was enabled on some architectures,
    depending on the uploaded package. It's now explicitely disabled on
    all architectures.


stable/main/binary-s390/python2.2-mpz_2.2.1-4.6_s390.deb
stable/main/binary-s390/python2.2-tk_2.2.1-4.6_s390.deb
stable/main/binary-s390/python2.2-xmlbase_2.2.1-4.6_s390.deb
stable/main/binary-s390/python2.2-gdbm_2.2.1-4.6_s390.deb
stable/main/binary-s390/python2.2-dev_2.2.1-4.6_s390.deb
stable/main/binary-s390/python2.2_2.2.1-4.6_s390.deb
python2.2 (2.2.1-4.6) stable-security; urgency=high
  * Revert patch suggested for #248946. Closes: #269548.
  * Apply upstream patch to fix #248946.
  * Note: In previous security updates, ipv6 was enabled on some architectures,
    depending on the uploaded package. It's now explicitely disabled on
    all architectures.


stable/main/binary-powerpc/python2.2-mpz_2.2.1-4.6_powerpc.deb
stable/main/binary-powerpc/python2.2-tk_2.2.1-4.6_powerpc.deb
stable/main/binary-powerpc/python2.2-dev_2.2.1-4.6_powerpc.deb
stable/main/binary-powerpc/python2.2-gdbm_2.2.1-4.6_powerpc.deb
stable/main/binary-powerpc/python2.2-xmlbase_2.2.1-4.6_powerpc.deb
stable/main/binary-powerpc/python2.2_2.2.1-4.6_powerpc.deb
python2.2 (2.2.1-4.6) stable-security; urgency=high
  * Revert patch suggested for #248946. Closes: #269548.
  * Apply upstream patch to fix #248946.
  * Note: In previous security updates, ipv6 was enabled on some architectures,
    depending on the uploaded package. It's now explicitely disabled on
    all architectures.


stable/main/binary-mipsel/python2.2-mpz_2.2.1-4.6_mipsel.deb
stable/main/binary-mipsel/python2.2-xmlbase_2.2.1-4.6_mipsel.deb
stable/main/binary-mipsel/python2.2-dev_2.2.1-4.6_mipsel.deb
stable/main/binary-mipsel/python2.2_2.2.1-4.6_mipsel.deb
stable/main/binary-mipsel/python2.2-gdbm_2.2.1-4.6_mipsel.deb
stable/main/binary-mipsel/python2.2-tk_2.2.1-4.6_mipsel.deb
python2.2 (2.2.1-4.6) stable-security; urgency=high
  * Revert patch suggested for #248946. Closes: #269548.
  * Apply upstream patch to fix #248946.
  * Note: In previous security updates, ipv6 was enabled on some architectures,
    depending on the uploaded package. It's now explicitely disabled on
    all architectures.


stable/main/binary-mips/python2.2-tk_2.2.1-4.6_mips.deb
stable/main/binary-mips/python2.2-xmlbase_2.2.1-4.6_mips.deb
stable/main/binary-mips/python2.2-mpz_2.2.1-4.6_mips.deb
stable/main/binary-mips/python2.2_2.2.1-4.6_mips.deb
stable/main/binary-mips/python2.2-dev_2.2.1-4.6_mips.deb
stable/main/binary-mips/python2.2-gdbm_2.2.1-4.6_mips.deb
python2.2 (2.2.1-4.6) stable-security; urgency=high
  * Revert patch suggested for #248946. Closes: #269548.
  * Apply upstream patch to fix #248946.
  * Note: In previous security updates, ipv6 was enabled on some architectures,
    depending on the uploaded package. It's now explicitely disabled on
    all architectures.


stable/main/binary-m68k/python2.2_2.2.1-4.6_m68k.deb
stable/main/binary-m68k/python2.2-tk_2.2.1-4.6_m68k.deb
stable/main/binary-m68k/python2.2-gdbm_2.2.1-4.6_m68k.deb
stable/main/binary-m68k/python2.2-mpz_2.2.1-4.6_m68k.deb
stable/main/binary-m68k/python2.2-xmlbase_2.2.1-4.6_m68k.deb
stable/main/binary-m68k/python2.2-dev_2.2.1-4.6_m68k.deb
python2.2 (2.2.1-4.6) stable-security; urgency=high
  * Revert patch suggested for #248946. Closes: #269548.
  * Apply upstream patch to fix #248946.
  * Note: In previous security updates, ipv6 was enabled on some architectures,
    depending on the uploaded package. It's now explicitely disabled on
    all architectures.


stable/main/binary-ia64/python2.2-xmlbase_2.2.1-4.6_ia64.deb
stable/main/binary-ia64/python2.2-gdbm_2.2.1-4.6_ia64.deb
stable/main/binary-ia64/python2.2-dev_2.2.1-4.6_ia64.deb
stable/main/binary-ia64/python2.2_2.2.1-4.6_ia64.deb
stable/main/binary-ia64/python2.2-tk_2.2.1-4.6_ia64.deb
stable/main/binary-ia64/python2.2-mpz_2.2.1-4.6_ia64.deb
python2.2 (2.2.1-4.6) stable-security; urgency=high
  * Revert patch suggested for #248946. Closes: #269548.
  * Apply upstream patch to fix #248946.
  * Note: In previous security updates, ipv6 was enabled on some architectures,
    depending on the uploaded package. It's now explicitely disabled on
    all architectures.


stable/main/binary-hppa/python2.2-gdbm_2.2.1-4.6_hppa.deb
stable/main/binary-hppa/python2.2-tk_2.2.1-4.6_hppa.deb
stable/main/binary-hppa/python2.2-mpz_2.2.1-4.6_hppa.deb
stable/main/binary-hppa/python2.2-dev_2.2.1-4.6_hppa.deb
stable/main/binary-hppa/python2.2-xmlbase_2.2.1-4.6_hppa.deb
stable/main/binary-hppa/python2.2_2.2.1-4.6_hppa.deb
python2.2 (2.2.1-4.6) stable-security; urgency=high
  * Revert patch suggested for #248946. Closes: #269548.
  * Apply upstream patch to fix #248946.
  * Note: In previous security updates, ipv6 was enabled on some architectures,
    depending on the uploaded package. It's now explicitely disabled on
    all architectures.


stable/main/binary-arm/python2.2_2.2.1-4.6_arm.deb
stable/main/binary-arm/python2.2-xmlbase_2.2.1-4.6_arm.deb
stable/main/binary-arm/python2.2-mpz_2.2.1-4.6_arm.deb
stable/main/binary-arm/python2.2-gdbm_2.2.1-4.6_arm.deb
stable/main/binary-arm/python2.2-tk_2.2.1-4.6_arm.deb
stable/main/binary-arm/python2.2-dev_2.2.1-4.6_arm.deb
python2.2 (2.2.1-4.6) stable-security; urgency=high
  * Revert patch suggested for #248946. Closes: #269548.
  * Apply upstream patch to fix #248946.
  * Note: In previous security updates, ipv6 was enabled on some architectures,
    depending on the uploaded package. It's now explicitely disabled on
    all architectures.


stable/main/binary-alpha/python2.2-xmlbase_2.2.1-4.6_alpha.deb
stable/main/binary-alpha/python2.2-gdbm_2.2.1-4.6_alpha.deb
stable/main/binary-alpha/python2.2-tk_2.2.1-4.6_alpha.deb
stable/main/binary-alpha/python2.2-dev_2.2.1-4.6_alpha.deb
stable/main/binary-alpha/python2.2-mpz_2.2.1-4.6_alpha.deb
stable/main/binary-alpha/python2.2_2.2.1-4.6_alpha.deb
python2.2 (2.2.1-4.6) stable-security; urgency=high
  * Revert patch suggested for #248946. Closes: #269548.
  * Apply upstream patch to fix #248946.
  * Note: In previous security updates, ipv6 was enabled on some architectures,
    depending on the uploaded package. It's now explicitely disabled on
    all architectures.


stable/main/binary-all/python2.2-elisp_2.2.1-4.6_all.deb
stable/main/source/python2.2_2.2.1-4.6.dsc
stable/main/binary-i386/python2.2-dev_2.2.1-4.6_i386.deb
stable/main/binary-i386/python2.2-gdbm_2.2.1-4.6_i386.deb
stable/main/binary-i386/python2.2-xmlbase_2.2.1-4.6_i386.deb
stable/main/binary-i386/python2.2-mpz_2.2.1-4.6_i386.deb
stable/main/source/python2.2_2.2.1-4.6.diff.gz
stable/main/binary-i386/python2.2-tk_2.2.1-4.6_i386.deb
stable/main/binary-all/idle-python2.2_2.2.1-4.6_all.deb
stable/main/binary-all/python2.2-doc_2.2.1-4.6_all.deb
stable/main/binary-all/python2.2-examples_2.2.1-4.6_all.deb
stable/main/binary-i386/python2.2_2.2.1-4.6_i386.deb
python2.2 (2.2.1-4.6) stable-security; urgency=high
  * Revert patch suggested for #248946. Closes: #269548.
  * Apply upstream patch to fix #248946.
  * Note: In previous security updates, ipv6 was enabled on some architectures,
    depending on the uploaded package. It's now explicitely disabled on
    all architectures.


stable/main/binary-sparc/libpgtcl_7.2.1-2woody5_sparc.deb
stable/main/binary-sparc/postgresql-dev_7.2.1-2woody5_sparc.deb
stable/main/binary-sparc/libecpg3_7.2.1-2woody5_sparc.deb
stable/main/binary-sparc/postgresql_7.2.1-2woody5_sparc.deb
stable/main/binary-sparc/python-pygresql_7.2.1-2woody5_sparc.deb
stable/main/binary-sparc/libpgperl_7.2.1-2woody5_sparc.deb
stable/main/binary-sparc/postgresql-client_7.2.1-2woody5_sparc.deb
stable/main/binary-sparc/pgaccess_7.2.1-2woody5_sparc.deb
stable/main/binary-sparc/odbc-postgresql_7.2.1-2woody5_sparc.deb
stable/main/binary-sparc/libpgsql2_7.2.1-2woody5_sparc.deb
stable/main/binary-sparc/postgresql-contrib_7.2.1-2woody5_sparc.deb
postgresql (7.2.1-2woody5) stable-security; urgency=low
  * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/):
    added parameter for target buffer size to make_string() to prevent
    buffer overflows and corrected all calls to it. This fixes #247306 for
    woody (bug was already closed with the upload to sid).
    With previous versions it was possible to crash (and possibly exploit)
    e. g. apache if a PHP script connected to a ODBC database with very long
    credential strings (DSN, username, password, etc.).
    Other parts of postgresql are not affected.


stable/main/binary-s390/libpgsql2_7.2.1-2woody5_s390.deb
stable/main/binary-s390/odbc-postgresql_7.2.1-2woody5_s390.deb
stable/main/binary-s390/libpgtcl_7.2.1-2woody5_s390.deb
stable/main/binary-s390/pgaccess_7.2.1-2woody5_s390.deb
stable/main/binary-s390/postgresql-dev_7.2.1-2woody5_s390.deb
stable/main/binary-s390/libecpg3_7.2.1-2woody5_s390.deb
stable/main/binary-s390/postgresql-contrib_7.2.1-2woody5_s390.deb
stable/main/binary-s390/libpgperl_7.2.1-2woody5_s390.deb
stable/main/binary-s390/postgresql_7.2.1-2woody5_s390.deb
stable/main/binary-s390/python-pygresql_7.2.1-2woody5_s390.deb
stable/main/binary-s390/postgresql-client_7.2.1-2woody5_s390.deb
postgresql (7.2.1-2woody5) stable-security; urgency=low
  * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/):
    added parameter for target buffer size to make_string() to prevent
    buffer overflows and corrected all calls to it. This fixes #247306 for
    woody (bug was already closed with the upload to sid).
    With previous versions it was possible to crash (and possibly exploit)
    e. g. apache if a PHP script connected to a ODBC database with very long
    credential strings (DSN, username, password, etc.).
    Other parts of postgresql are not affected.


stable/main/binary-powerpc/postgresql_7.2.1-2woody5_powerpc.deb
stable/main/binary-powerpc/libecpg3_7.2.1-2woody5_powerpc.deb
stable/main/binary-powerpc/postgresql-client_7.2.1-2woody5_powerpc.deb
stable/main/binary-powerpc/pgaccess_7.2.1-2woody5_powerpc.deb
stable/main/binary-powerpc/libpgsql2_7.2.1-2woody5_powerpc.deb
stable/main/binary-powerpc/postgresql-dev_7.2.1-2woody5_powerpc.deb
stable/main/binary-powerpc/libpgperl_7.2.1-2woody5_powerpc.deb
stable/main/binary-powerpc/libpgtcl_7.2.1-2woody5_powerpc.deb
stable/main/binary-powerpc/odbc-postgresql_7.2.1-2woody5_powerpc.deb
stable/main/binary-powerpc/python-pygresql_7.2.1-2woody5_powerpc.deb
stable/main/binary-powerpc/postgresql-contrib_7.2.1-2woody5_powerpc.deb
postgresql (7.2.1-2woody5) stable-security; urgency=low
  * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/):
    added parameter for target buffer size to make_string() to prevent
    buffer overflows and corrected all calls to it. This fixes #247306 for
    woody (bug was already closed with the upload to sid).
    With previous versions it was possible to crash (and possibly exploit)
    e. g. apache if a PHP script connected to a ODBC database with very long
    credential strings (DSN, username, password, etc.).
    Other parts of postgresql are not affected.


stable/main/binary-mipsel/libpgsql2_7.2.1-2woody5_mipsel.deb
stable/main/binary-mipsel/postgresql-dev_7.2.1-2woody5_mipsel.deb
stable/main/binary-mipsel/libpgperl_7.2.1-2woody5_mipsel.deb
stable/main/binary-mipsel/pgaccess_7.2.1-2woody5_mipsel.deb
stable/main/binary-mipsel/libecpg3_7.2.1-2woody5_mipsel.deb
stable/main/binary-mipsel/postgresql_7.2.1-2woody5_mipsel.deb
stable/main/binary-mipsel/postgresql-contrib_7.2.1-2woody5_mipsel.deb
stable/main/binary-mipsel/postgresql-client_7.2.1-2woody5_mipsel.deb
stable/main/binary-mipsel/odbc-postgresql_7.2.1-2woody5_mipsel.deb
stable/main/binary-mipsel/python-pygresql_7.2.1-2woody5_mipsel.deb
stable/main/binary-mipsel/libpgtcl_7.2.1-2woody5_mipsel.deb
postgresql (7.2.1-2woody5) stable-security; urgency=low
  * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/):
    added parameter for target buffer size to make_string() to prevent
    buffer overflows and corrected all calls to it. This fixes #247306 for
    woody (bug was already closed with the upload to sid).
    With previous versions it was possible to crash (and possibly exploit)
    e. g. apache if a PHP script connected to a ODBC database with very long
    credential strings (DSN, username, password, etc.).
    Other parts of postgresql are not affected.


stable/main/binary-mips/postgresql-dev_7.2.1-2woody5_mips.deb
stable/main/binary-mips/odbc-postgresql_7.2.1-2woody5_mips.deb
stable/main/binary-mips/libpgtcl_7.2.1-2woody5_mips.deb
stable/main/binary-mips/libecpg3_7.2.1-2woody5_mips.deb
stable/main/binary-mips/pgaccess_7.2.1-2woody5_mips.deb
stable/main/binary-mips/postgresql-contrib_7.2.1-2woody5_mips.deb
stable/main/binary-mips/python-pygresql_7.2.1-2woody5_mips.deb
stable/main/binary-mips/postgresql-client_7.2.1-2woody5_mips.deb
stable/main/binary-mips/libpgsql2_7.2.1-2woody5_mips.deb
stable/main/binary-mips/postgresql_7.2.1-2woody5_mips.deb
stable/main/binary-mips/libpgperl_7.2.1-2woody5_mips.deb
postgresql (7.2.1-2woody5) stable-security; urgency=low
  * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/):
    added parameter for target buffer size to make_string() to prevent
    buffer overflows and corrected all calls to it. This fixes #247306 for
    woody (bug was already closed with the upload to sid).
    With previous versions it was possible to crash (and possibly exploit)
    e. g. apache if a PHP script connected to a ODBC database with very long
    credential strings (DSN, username, password, etc.).
    Other parts of postgresql are not affected.


stable/main/binary-m68k/postgresql_7.2.1-2woody5_m68k.deb
stable/main/binary-m68k/postgresql-client_7.2.1-2woody5_m68k.deb
stable/main/binary-m68k/pgaccess_7.2.1-2woody5_m68k.deb
stable/main/binary-m68k/libpgperl_7.2.1-2woody5_m68k.deb
stable/main/binary-m68k/python-pygresql_7.2.1-2woody5_m68k.deb
stable/main/binary-m68k/postgresql-dev_7.2.1-2woody5_m68k.deb
stable/main/binary-m68k/libecpg3_7.2.1-2woody5_m68k.deb
stable/main/binary-m68k/libpgtcl_7.2.1-2woody5_m68k.deb
stable/main/binary-m68k/odbc-postgresql_7.2.1-2woody5_m68k.deb
stable/main/binary-m68k/libpgsql2_7.2.1-2woody5_m68k.deb
stable/main/binary-m68k/postgresql-contrib_7.2.1-2woody5_m68k.deb
postgresql (7.2.1-2woody5) stable-security; urgency=low
  * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/):
    added parameter for target buffer size to make_string() to prevent
    buffer overflows and corrected all calls to it. This fixes #247306 for
    woody (bug was already closed with the upload to sid).
    With previous versions it was possible to crash (and possibly exploit)
    e. g. apache if a PHP script connected to a ODBC database with very long
    credential strings (DSN, username, password, etc.).
    Other parts of postgresql are not affected.


stable/main/binary-ia64/pgaccess_7.2.1-2woody5_ia64.deb
stable/main/binary-ia64/postgresql-client_7.2.1-2woody5_ia64.deb
stable/main/binary-ia64/odbc-postgresql_7.2.1-2woody5_ia64.deb
stable/main/binary-ia64/libecpg3_7.2.1-2woody5_ia64.deb
stable/main/binary-ia64/postgresql-dev_7.2.1-2woody5_ia64.deb
stable/main/binary-ia64/postgresql-contrib_7.2.1-2woody5_ia64.deb
stable/main/binary-ia64/libpgsql2_7.2.1-2woody5_ia64.deb
stable/main/binary-ia64/libpgperl_7.2.1-2woody5_ia64.deb
stable/main/binary-ia64/libpgtcl_7.2.1-2woody5_ia64.deb
stable/main/binary-ia64/postgresql_7.2.1-2woody5_ia64.deb
stable/main/binary-ia64/python-pygresql_7.2.1-2woody5_ia64.deb
postgresql (7.2.1-2woody5) stable-security; urgency=low
  * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/):
    added parameter for target buffer size to make_string() to prevent
    buffer overflows and corrected all calls to it. This fixes #247306 for
    woody (bug was already closed with the upload to sid).
    With previous versions it was possible to crash (and possibly exploit)
    e. g. apache if a PHP script connected to a ODBC database with very long
    credential strings (DSN, username, password, etc.).
    Other parts of postgresql are not affected.


stable/main/binary-hppa/pgaccess_7.2.1-2woody5_hppa.deb
stable/main/binary-hppa/postgresql-contrib_7.2.1-2woody5_hppa.deb
stable/main/binary-hppa/libpgperl_7.2.1-2woody5_hppa.deb
stable/main/binary-hppa/python-pygresql_7.2.1-2woody5_hppa.deb
stable/main/binary-hppa/libecpg3_7.2.1-2woody5_hppa.deb
stable/main/binary-hppa/postgresql_7.2.1-2woody5_hppa.deb
stable/main/binary-hppa/postgresql-dev_7.2.1-2woody5_hppa.deb
stable/main/binary-hppa/libpgsql2_7.2.1-2woody5_hppa.deb
stable/main/binary-hppa/odbc-postgresql_7.2.1-2woody5_hppa.deb
stable/main/binary-hppa/libpgtcl_7.2.1-2woody5_hppa.deb
stable/main/binary-hppa/postgresql-client_7.2.1-2woody5_hppa.deb
postgresql (7.2.1-2woody5) stable-security; urgency=low
  * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/):
    added parameter for target buffer size to make_string() to prevent
    buffer overflows and corrected all calls to it. This fixes #247306 for
    woody (bug was already closed with the upload to sid).
    With previous versions it was possible to crash (and possibly exploit)
    e. g. apache if a PHP script connected to a ODBC database with very long
    credential strings (DSN, username, password, etc.).
    Other parts of postgresql are not affected.


stable/main/binary-arm/libpgsql2_7.2.1-2woody5_arm.deb
stable/main/binary-arm/libecpg3_7.2.1-2woody5_arm.deb
stable/main/binary-arm/libpgperl_7.2.1-2woody5_arm.deb
stable/main/binary-arm/libpgtcl_7.2.1-2woody5_arm.deb
stable/main/binary-arm/postgresql_7.2.1-2woody5_arm.deb
stable/main/binary-arm/pgaccess_7.2.1-2woody5_arm.deb
stable/main/binary-arm/postgresql-client_7.2.1-2woody5_arm.deb
stable/main/binary-arm/postgresql-contrib_7.2.1-2woody5_arm.deb
stable/main/binary-arm/odbc-postgresql_7.2.1-2woody5_arm.deb
stable/main/binary-arm/python-pygresql_7.2.1-2woody5_arm.deb
stable/main/binary-arm/postgresql-dev_7.2.1-2woody5_arm.deb
postgresql (7.2.1-2woody5) stable-security; urgency=low
  * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/):
    added parameter for target buffer size to make_string() to prevent
    buffer overflows and corrected all calls to it. This fixes #247306 for
    woody (bug was already closed with the upload to sid).
    With previous versions it was possible to crash (and possibly exploit)
    e. g. apache if a PHP script connected to a ODBC database with very long
    credential strings (DSN, username, password, etc.).
    Other parts of postgresql are not affected.


stable/main/binary-alpha/postgresql-contrib_7.2.1-2woody5_alpha.deb
stable/main/binary-alpha/libpgsql2_7.2.1-2woody5_alpha.deb
stable/main/binary-alpha/python-pygresql_7.2.1-2woody5_alpha.deb
stable/main/binary-alpha/libpgtcl_7.2.1-2woody5_alpha.deb
stable/main/binary-alpha/libpgperl_7.2.1-2woody5_alpha.deb
stable/main/binary-alpha/postgresql-dev_7.2.1-2woody5_alpha.deb
stable/main/binary-alpha/odbc-postgresql_7.2.1-2woody5_alpha.deb
stable/main/binary-alpha/pgaccess_7.2.1-2woody5_alpha.deb
stable/main/binary-alpha/postgresql_7.2.1-2woody5_alpha.deb
stable/main/binary-alpha/libecpg3_7.2.1-2woody5_alpha.deb
stable/main/binary-alpha/postgresql-client_7.2.1-2woody5_alpha.deb
postgresql (7.2.1-2woody5) stable-security; urgency=low
  * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/):
    added parameter for target buffer size to make_string() to prevent
    buffer overflows and corrected all calls to it. This fixes #247306 for
    woody (bug was already closed with the upload to sid).
    With previous versions it was possible to crash (and possibly exploit)
    e. g. apache if a PHP script connected to a ODBC database with very long
    credential strings (DSN, username, password, etc.).
    Other parts of postgresql are not affected.


stable/main/source/postgresql_7.2.1-2woody5.dsc
stable/main/binary-i386/python-pygresql_7.2.1-2woody5_i386.deb
stable/main/binary-i386/libpgtcl_7.2.1-2woody5_i386.deb
stable/main/binary-i386/odbc-postgresql_7.2.1-2woody5_i386.deb
stable/main/binary-i386/postgresql-client_7.2.1-2woody5_i386.deb
stable/main/binary-i386/postgresql_7.2.1-2woody5_i386.deb
stable/main/binary-i386/libpgperl_7.2.1-2woody5_i386.deb
stable/main/binary-i386/libecpg3_7.2.1-2woody5_i386.deb
stable/main/source/postgresql_7.2.1-2woody5.diff.gz
stable/main/binary-i386/postgresql-contrib_7.2.1-2woody5_i386.deb
stable/main/binary-i386/pgaccess_7.2.1-2woody5_i386.deb
stable/main/binary-i386/postgresql-dev_7.2.1-2woody5_i386.deb
stable/main/binary-all/postgresql-doc_7.2.1-2woody5_all.deb
stable/main/binary-i386/libpgsql2_7.2.1-2woody5_i386.deb
postgresql (7.2.1-2woody5) stable-security; urgency=low
  * Fixed buffer overflow in ODBC driver (src/interfaces/odbc/):
    added parameter for target buffer size to make_string() to prevent
    buffer overflows and corrected all calls to it. This fixes #247306 for
    woody (bug was already closed with the upload to sid).
    With previous versions it was possible to crash (and possibly exploit)
    e. g. apache if a PHP script connected to a ODBC database with very long
    credential strings (DSN, username, password, etc.).
    Other parts of postgresql are not affected.


stable/main/binary-all/phpsysinfo_2.0-3woody1_all.deb
stable/main/source/phpsysinfo_2.0-3woody1.diff.gz
stable/main/source/phpsysinfo_2.0-3woody1.dsc
phpsysinfo (2.0-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Avoid reading arbitrary files via relative pathnames in 'template' and
    'lng' variables (CAN-2003-0536)


stable/main/source/phpgroupware_0.9.14-0.RC3.2.woody3.diff.gz
stable/main/binary-all/phpgroupware-ftp_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-forum_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-phpsysinfo_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-hr_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-eldaptir_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-registration_0.9.14-0.RC3.2.woody3_all.deb
stable/main/source/phpgroupware_0.9.14-0.RC3.2.woody3.dsc
stable/main/binary-all/phpgroupware-soap_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-brewer_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-manual_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-polls_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-api-doc_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-bookkeeping_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-skel_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-messenger_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-tts_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-chora_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-nntp_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-weather_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-stocks_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-inv_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-admin_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-core_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-img_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-phpwebhosting_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-developer-tools_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-xmlrpc_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-core-doc_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-filemanager_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-notes_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-email_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-wap_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-phonelog_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-api_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-infolog_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-addressbook_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-setup_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-comic_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-dj_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-headlines_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-calendar_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-chat_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-projects_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-preferences_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-todo_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-news-admin_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-bookmarks_0.9.14-0.RC3.2.woody3_all.deb
stable/main/binary-all/phpgroupware-napster_0.9.14-0.RC3.2.woody3_all.deb
phpgroupware (0.9.14-0.RC3.2.woody3) stable-security; urgency=high
  * Security update
    Upstream security fixes until 0.9.14.007
    - fix sql insertion in calendar and infolog
    - fix script file insertion via holiday files
      holiday files now must have extension txt, will automatically rename
      existing files in postinst
    - addenda to last security update (translations)
    Debian specific
    - fix world writable directories in created by
      phpgroupware.postinst (fixes bug 207797 in woody)
  * Change version number to indicate security inclusion of fixes
    at the request of phpgroupware people
  * Remove link /usr/share/phpgroupware/files, this is needed
    to fix vfs storage problem noted in CAN-2003-0599 and
    addressed by last security update.


stable/main/binary-i386/php4-mcal_4.1.2-7.0.1_i386.deb
stable/main/binary-i386/php4-odbc_4.1.2-7.0.1_i386.deb
stable/main/binary-i386/php4-imap_4.1.2-7.0.1_i386.deb
stable/main/binary-i386/php4-cgi_4.1.2-7.0.1_i386.deb
stable/main/binary-i386/php4-gd_4.1.2-7.0.1_i386.deb
stable/main/binary-i386/php4-mhash_4.1.2-7.0.1_i386.deb
stable/main/binary-i386/php4-mysql_4.1.2-7.0.1_i386.deb
stable/main/binary-i386/php4-sybase_4.1.2-7.0.1_i386.deb
stable/main/binary-i386/caudium-php4_4.1.2-7.0.1_i386.deb
stable/main/binary-i386/php4-xslt_4.1.2-7.0.1_i386.deb
stable/main/binary-i386/php4_4.1.2-7.0.1_i386.deb
stable/main/binary-i386/php4-domxml_4.1.2-7.0.1_i386.deb
stable/main/binary-i386/php4-curl_4.1.2-7.0.1_i386.deb
stable/main/binary-i386/php4-ldap_4.1.2-7.0.1_i386.deb
stable/main/binary-i386/php4-snmp_4.1.2-7.0.1_i386.deb
stable/main/binary-i386/php4-recode_4.1.2-7.0.1_i386.deb
php4 (4:4.1.2-7.0.1) stable-security; urgency=low
  * Rebuild to get proper dependencies on php4-curl (closes: #260724)


stable/main/binary-sparc/php4-gd_4.1.2-7_sparc.deb
stable/main/binary-sparc/php4-domxml_4.1.2-7_sparc.deb
stable/main/binary-sparc/caudium-php4_4.1.2-7_sparc.deb
stable/main/binary-sparc/php4-recode_4.1.2-7_sparc.deb
stable/main/binary-sparc/php4_4.1.2-7_sparc.deb
stable/main/binary-sparc/php4-ldap_4.1.2-7_sparc.deb
stable/main/binary-sparc/php4-odbc_4.1.2-7_sparc.deb
stable/main/binary-sparc/php4-sybase_4.1.2-7_sparc.deb
stable/main/binary-sparc/php4-curl_4.1.2-7_sparc.deb
stable/main/binary-sparc/php4-imap_4.1.2-7_sparc.deb
stable/main/binary-sparc/php4-mysql_4.1.2-7_sparc.deb
stable/main/binary-sparc/php4-mhash_4.1.2-7_sparc.deb
stable/main/binary-sparc/php4-mcal_4.1.2-7_sparc.deb
stable/main/binary-sparc/php4-snmp_4.1.2-7_sparc.deb
stable/main/binary-sparc/php4-cgi_4.1.2-7_sparc.deb
stable/main/binary-sparc/php4-xslt_4.1.2-7_sparc.deb
php4 (4:4.1.2-7) stable-security; urgency=high
  * Backport of several security fixes from the 4.3 branch:
    - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685)
    - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8
    - Improved stability during startup when memory_limit is used.
    - Replace alloca() with emalloc() for better stack protection.
    - Fixed strip_tags() to correctly handle '\0' characters.
    - NULLify appname and server_message on shutdown of SQL extensions
    - Added missing safe_mode checks inside itpc.


stable/main/binary-s390/php4_4.1.2-7_s390.deb
stable/main/binary-s390/php4-imap_4.1.2-7_s390.deb
stable/main/binary-s390/php4-snmp_4.1.2-7_s390.deb
stable/main/binary-s390/php4-cgi_4.1.2-7_s390.deb
stable/main/binary-s390/php4-sybase_4.1.2-7_s390.deb
stable/main/binary-s390/php4-mhash_4.1.2-7_s390.deb
stable/main/binary-s390/php4-curl_4.1.2-7_s390.deb
stable/main/binary-s390/php4-mcal_4.1.2-7_s390.deb
stable/main/binary-s390/php4-domxml_4.1.2-7_s390.deb
stable/main/binary-s390/php4-xslt_4.1.2-7_s390.deb
stable/main/binary-s390/caudium-php4_4.1.2-7_s390.deb
stable/main/binary-s390/php4-mysql_4.1.2-7_s390.deb
stable/main/binary-s390/php4-gd_4.1.2-7_s390.deb
stable/main/binary-s390/php4-recode_4.1.2-7_s390.deb
stable/main/binary-s390/php4-ldap_4.1.2-7_s390.deb
stable/main/binary-s390/php4-odbc_4.1.2-7_s390.deb
php4 (4:4.1.2-7) stable-security; urgency=high
  * Backport of several security fixes from the 4.3 branch:
    - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685)
    - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8
    - Improved stability during startup when memory_limit is used.
    - Replace alloca() with emalloc() for better stack protection.
    - Fixed strip_tags() to correctly handle '\0' characters.
    - NULLify appname and server_message on shutdown of SQL extensions
    - Added missing safe_mode checks inside itpc.


stable/main/binary-powerpc/php4-mcal_4.1.2-7_powerpc.deb
stable/main/binary-powerpc/php4-snmp_4.1.2-7_powerpc.deb
stable/main/binary-powerpc/php4_4.1.2-7_powerpc.deb
stable/main/binary-powerpc/php4-ldap_4.1.2-7_powerpc.deb
stable/main/binary-powerpc/php4-recode_4.1.2-7_powerpc.deb
stable/main/binary-powerpc/php4-odbc_4.1.2-7_powerpc.deb
stable/main/binary-powerpc/php4-mysql_4.1.2-7_powerpc.deb
stable/main/binary-powerpc/php4-curl_4.1.2-7_powerpc.deb
stable/main/binary-powerpc/php4-imap_4.1.2-7_powerpc.deb
stable/main/binary-powerpc/php4-mhash_4.1.2-7_powerpc.deb
stable/main/binary-powerpc/caudium-php4_4.1.2-7_powerpc.deb
stable/main/binary-powerpc/php4-domxml_4.1.2-7_powerpc.deb
stable/main/binary-powerpc/php4-sybase_4.1.2-7_powerpc.deb
stable/main/binary-powerpc/php4-gd_4.1.2-7_powerpc.deb
stable/main/binary-powerpc/php4-xslt_4.1.2-7_powerpc.deb
stable/main/binary-powerpc/php4-cgi_4.1.2-7_powerpc.deb
php4 (4:4.1.2-7) stable-security; urgency=high
  * Backport of several security fixes from the 4.3 branch:
    - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685)
    - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8
    - Improved stability during startup when memory_limit is used.
    - Replace alloca() with emalloc() for better stack protection.
    - Fixed strip_tags() to correctly handle '\0' characters.
    - NULLify appname and server_message on shutdown of SQL extensions
    - Added missing safe_mode checks inside itpc.


stable/main/binary-mipsel/php4-mhash_4.1.2-7_mipsel.deb
stable/main/binary-mipsel/php4-recode_4.1.2-7_mipsel.deb
stable/main/binary-mipsel/php4_4.1.2-7_mipsel.deb
stable/main/binary-mipsel/php4-gd_4.1.2-7_mipsel.deb
stable/main/binary-mipsel/php4-cgi_4.1.2-7_mipsel.deb
stable/main/binary-mipsel/php4-mcal_4.1.2-7_mipsel.deb
stable/main/binary-mipsel/php4-odbc_4.1.2-7_mipsel.deb
stable/main/binary-mipsel/php4-xslt_4.1.2-7_mipsel.deb
stable/main/binary-mipsel/php4-curl_4.1.2-7_mipsel.deb
stable/main/binary-mipsel/php4-imap_4.1.2-7_mipsel.deb
stable/main/binary-mipsel/caudium-php4_4.1.2-7_mipsel.deb
stable/main/binary-mipsel/php4-ldap_4.1.2-7_mipsel.deb
stable/main/binary-mipsel/php4-snmp_4.1.2-7_mipsel.deb
stable/main/binary-mipsel/php4-sybase_4.1.2-7_mipsel.deb
stable/main/binary-mipsel/php4-mysql_4.1.2-7_mipsel.deb
stable/main/binary-mipsel/php4-domxml_4.1.2-7_mipsel.deb
php4 (4:4.1.2-7) stable-security; urgency=high
  * Backport of several security fixes from the 4.3 branch:
    - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685)
    - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8
    - Improved stability during startup when memory_limit is used.
    - Replace alloca() with emalloc() for better stack protection.
    - Fixed strip_tags() to correctly handle '\0' characters.
    - NULLify appname and server_message on shutdown of SQL extensions
    - Added missing safe_mode checks inside itpc.


stable/main/binary-mips/php4-mhash_4.1.2-7_mips.deb
stable/main/binary-mips/php4-curl_4.1.2-7_mips.deb
stable/main/binary-mips/php4-gd_4.1.2-7_mips.deb
stable/main/binary-mips/php4-sybase_4.1.2-7_mips.deb
stable/main/binary-mips/php4-mysql_4.1.2-7_mips.deb
stable/main/binary-mips/php4-ldap_4.1.2-7_mips.deb
stable/main/binary-mips/php4_4.1.2-7_mips.deb
stable/main/binary-mips/php4-odbc_4.1.2-7_mips.deb
stable/main/binary-mips/php4-xslt_4.1.2-7_mips.deb
stable/main/binary-mips/caudium-php4_4.1.2-7_mips.deb
stable/main/binary-mips/php4-snmp_4.1.2-7_mips.deb
stable/main/binary-mips/php4-imap_4.1.2-7_mips.deb
stable/main/binary-mips/php4-cgi_4.1.2-7_mips.deb
stable/main/binary-mips/php4-mcal_4.1.2-7_mips.deb
stable/main/binary-mips/php4-domxml_4.1.2-7_mips.deb
stable/main/binary-mips/php4-recode_4.1.2-7_mips.deb
php4 (4:4.1.2-7) stable-security; urgency=high
  * Backport of several security fixes from the 4.3 branch:
    - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685)
    - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8
    - Improved stability during startup when memory_limit is used.
    - Replace alloca() with emalloc() for better stack protection.
    - Fixed strip_tags() to correctly handle '\0' characters.
    - NULLify appname and server_message on shutdown of SQL extensions
    - Added missing safe_mode checks inside itpc.


stable/main/binary-m68k/php4-curl_4.1.2-7_m68k.deb
stable/main/binary-m68k/php4-mysql_4.1.2-7_m68k.deb
stable/main/binary-m68k/php4-odbc_4.1.2-7_m68k.deb
stable/main/binary-m68k/php4-sybase_4.1.2-7_m68k.deb
stable/main/binary-m68k/php4-snmp_4.1.2-7_m68k.deb
stable/main/binary-m68k/php4-gd_4.1.2-7_m68k.deb
stable/main/binary-m68k/php4-recode_4.1.2-7_m68k.deb
stable/main/binary-m68k/php4-xslt_4.1.2-7_m68k.deb
stable/main/binary-m68k/php4_4.1.2-7_m68k.deb
stable/main/binary-m68k/php4-domxml_4.1.2-7_m68k.deb
stable/main/binary-m68k/php4-mhash_4.1.2-7_m68k.deb
stable/main/binary-m68k/caudium-php4_4.1.2-7_m68k.deb
stable/main/binary-m68k/php4-imap_4.1.2-7_m68k.deb
stable/main/binary-m68k/php4-ldap_4.1.2-7_m68k.deb
stable/main/binary-m68k/php4-cgi_4.1.2-7_m68k.deb
stable/main/binary-m68k/php4-mcal_4.1.2-7_m68k.deb
php4 (4:4.1.2-7) stable-security; urgency=high
  * Backport of several security fixes from the 4.3 branch:
    - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685)
    - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8
    - Improved stability during startup when memory_limit is used.
    - Replace alloca() with emalloc() for better stack protection.
    - Fixed strip_tags() to correctly handle '\0' characters.
    - NULLify appname and server_message on shutdown of SQL extensions
    - Added missing safe_mode checks inside itpc.


stable/main/binary-ia64/php4-snmp_4.1.2-7_ia64.deb
stable/main/binary-ia64/php4-mysql_4.1.2-7_ia64.deb
stable/main/binary-ia64/php4-sybase_4.1.2-7_ia64.deb
stable/main/binary-ia64/php4-mhash_4.1.2-7_ia64.deb
stable/main/binary-ia64/php4-gd_4.1.2-7_ia64.deb
stable/main/binary-ia64/php4-curl_4.1.2-7_ia64.deb
stable/main/binary-ia64/php4-cgi_4.1.2-7_ia64.deb
stable/main/binary-ia64/php4-mcal_4.1.2-7_ia64.deb
stable/main/binary-ia64/php4-domxml_4.1.2-7_ia64.deb
stable/main/binary-ia64/php4_4.1.2-7_ia64.deb
stable/main/binary-ia64/php4-odbc_4.1.2-7_ia64.deb
stable/main/binary-ia64/php4-xslt_4.1.2-7_ia64.deb
stable/main/binary-ia64/caudium-php4_4.1.2-7_ia64.deb
stable/main/binary-ia64/php4-ldap_4.1.2-7_ia64.deb
stable/main/binary-ia64/php4-recode_4.1.2-7_ia64.deb
stable/main/binary-ia64/php4-imap_4.1.2-7_ia64.deb
php4 (4:4.1.2-7) stable-security; urgency=high
  * Backport of several security fixes from the 4.3 branch:
    - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685)
    - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8
    - Improved stability during startup when memory_limit is used.
    - Replace alloca() with emalloc() for better stack protection.
    - Fixed strip_tags() to correctly handle '\0' characters.
    - NULLify appname and server_message on shutdown of SQL extensions
    - Added missing safe_mode checks inside itpc.


stable/main/binary-hppa/php4-mcal_4.1.2-7_hppa.deb
stable/main/binary-hppa/php4-curl_4.1.2-7_hppa.deb
stable/main/binary-hppa/caudium-php4_4.1.2-7_hppa.deb
stable/main/binary-hppa/php4-xslt_4.1.2-7_hppa.deb
stable/main/binary-hppa/php4-gd_4.1.2-7_hppa.deb
stable/main/binary-hppa/php4_4.1.2-7_hppa.deb
stable/main/binary-hppa/php4-ldap_4.1.2-7_hppa.deb
stable/main/binary-hppa/php4-snmp_4.1.2-7_hppa.deb
stable/main/binary-hppa/php4-domxml_4.1.2-7_hppa.deb
stable/main/binary-hppa/php4-sybase_4.1.2-7_hppa.deb
stable/main/binary-hppa/php4-recode_4.1.2-7_hppa.deb
stable/main/binary-hppa/php4-mhash_4.1.2-7_hppa.deb
stable/main/binary-hppa/php4-imap_4.1.2-7_hppa.deb
stable/main/binary-hppa/php4-mysql_4.1.2-7_hppa.deb
stable/main/binary-hppa/php4-odbc_4.1.2-7_hppa.deb
stable/main/binary-hppa/php4-cgi_4.1.2-7_hppa.deb
php4 (4:4.1.2-7) stable-security; urgency=high
  * Backport of several security fixes from the 4.3 branch:
    - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685)
    - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8
    - Improved stability during startup when memory_limit is used.
    - Replace alloca() with emalloc() for better stack protection.
    - Fixed strip_tags() to correctly handle '\0' characters.
    - NULLify appname and server_message on shutdown of SQL extensions
    - Added missing safe_mode checks inside itpc.


stable/main/binary-arm/php4-mhash_4.1.2-7_arm.deb
stable/main/binary-arm/php4-mysql_4.1.2-7_arm.deb
stable/main/binary-arm/php4-odbc_4.1.2-7_arm.deb
stable/main/binary-arm/php4-gd_4.1.2-7_arm.deb
stable/main/binary-arm/php4-recode_4.1.2-7_arm.deb
stable/main/binary-arm/php4-sybase_4.1.2-7_arm.deb
stable/main/binary-arm/php4_4.1.2-7_arm.deb
stable/main/binary-arm/caudium-php4_4.1.2-7_arm.deb
stable/main/binary-arm/php4-curl_4.1.2-7_arm.deb
stable/main/binary-arm/php4-cgi_4.1.2-7_arm.deb
stable/main/binary-arm/php4-xslt_4.1.2-7_arm.deb
stable/main/binary-arm/php4-snmp_4.1.2-7_arm.deb
stable/main/binary-arm/php4-ldap_4.1.2-7_arm.deb
stable/main/binary-arm/php4-imap_4.1.2-7_arm.deb
stable/main/binary-arm/php4-mcal_4.1.2-7_arm.deb
stable/main/binary-arm/php4-domxml_4.1.2-7_arm.deb
php4 (4:4.1.2-7) stable-security; urgency=high
  * Backport of several security fixes from the 4.3 branch:
    - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685)
    - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8
    - Improved stability during startup when memory_limit is used.
    - Replace alloca() with emalloc() for better stack protection.
    - Fixed strip_tags() to correctly handle '\0' characters.
    - NULLify appname and server_message on shutdown of SQL extensions
    - Added missing safe_mode checks inside itpc.


stable/main/binary-alpha/php4-imap_4.1.2-7_alpha.deb
stable/main/binary-alpha/php4_4.1.2-7_alpha.deb
stable/main/binary-alpha/php4-xslt_4.1.2-7_alpha.deb
stable/main/binary-alpha/php4-mcal_4.1.2-7_alpha.deb
stable/main/binary-alpha/php4-cgi_4.1.2-7_alpha.deb
stable/main/binary-alpha/caudium-php4_4.1.2-7_alpha.deb
stable/main/binary-alpha/php4-domxml_4.1.2-7_alpha.deb
stable/main/binary-alpha/php4-sybase_4.1.2-7_alpha.deb
stable/main/binary-alpha/php4-curl_4.1.2-7_alpha.deb
stable/main/binary-alpha/php4-odbc_4.1.2-7_alpha.deb
stable/main/binary-alpha/php4-gd_4.1.2-7_alpha.deb
stable/main/binary-alpha/php4-mhash_4.1.2-7_alpha.deb
stable/main/binary-alpha/php4-ldap_4.1.2-7_alpha.deb
stable/main/binary-alpha/php4-recode_4.1.2-7_alpha.deb
stable/main/binary-alpha/php4-mysql_4.1.2-7_alpha.deb
stable/main/binary-alpha/php4-snmp_4.1.2-7_alpha.deb
php4 (4:4.1.2-7) stable-security; urgency=high
  * Backport of several security fixes from the 4.3 branch:
    - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685)
    - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8
    - Improved stability during startup when memory_limit is used.
    - Replace alloca() with emalloc() for better stack protection.
    - Fixed strip_tags() to correctly handle '\0' characters.
    - NULLify appname and server_message on shutdown of SQL extensions
    - Added missing safe_mode checks inside itpc.


stable/main/binary-i386/php4-recode_4.1.2-7_i386.deb
stable/main/binary-i386/php4-cgi_4.1.2-7_i386.deb
stable/main/binary-i386/php4-mcal_4.1.2-7_i386.deb
stable/main/binary-i386/php4-imap_4.1.2-7_i386.deb
stable/main/binary-i386/php4-odbc_4.1.2-7_i386.deb
stable/main/binary-i386/php4-ldap_4.1.2-7_i386.deb
stable/main/binary-i386/php4-domxml_4.1.2-7_i386.deb
stable/main/binary-i386/php4-mhash_4.1.2-7_i386.deb
stable/main/binary-i386/php4-mysql_4.1.2-7_i386.deb
stable/main/binary-all/php4-dev_4.1.2-7_all.deb
stable/main/source/php4_4.1.2-7.dsc
stable/main/binary-all/php4-pear_4.1.2-7_all.deb
stable/main/binary-i386/php4-curl_4.1.2-7_i386.deb
stable/main/binary-i386/php4-snmp_4.1.2-7_i386.deb
stable/main/binary-i386/php4-sybase_4.1.2-7_i386.deb
stable/main/binary-i386/php4_4.1.2-7_i386.deb
stable/main/binary-i386/php4-gd_4.1.2-7_i386.deb
stable/main/source/php4_4.1.2-7.diff.gz
stable/main/binary-i386/php4-xslt_4.1.2-7_i386.deb
stable/main/binary-i386/caudium-php4_4.1.2-7_i386.deb
php4 (4:4.1.2-7) stable-security; urgency=high
  * Backport of several security fixes from the 4.3 branch:
    - Addresses CAN-2004-0594, CAN-2004-0595 (closes: #259351, #259685)
    - Backported _CHECK_MEMORY_LIMIT routine from 4.3.8
    - Improved stability during startup when memory_limit is used.
    - Replace alloca() with emalloc() for better stack protection.
    - Fixed strip_tags() to correctly handle '\0' characters.
    - NULLify appname and server_message on shutdown of SQL extensions
    - Added missing safe_mode checks inside itpc.


stable/main/binary-sparc/libperl5.6_5.6.1-8.7_sparc.deb
stable/main/binary-sparc/perl-debug_5.6.1-8.7_sparc.deb
stable/main/binary-sparc/perl-base_5.6.1-8.7_sparc.deb
stable/main/binary-sparc/libperl-dev_5.6.1-8.7_sparc.deb
stable/main/binary-sparc/perl-suid_5.6.1-8.7_sparc.deb
stable/main/binary-sparc/perl_5.6.1-8.7_sparc.deb
perl (5.6.1-8.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for
    CAN-2003-0618


stable/main/binary-s390/perl-base_5.6.1-8.7_s390.deb
stable/main/binary-s390/libperl-dev_5.6.1-8.7_s390.deb
stable/main/binary-s390/libperl5.6_5.6.1-8.7_s390.deb
stable/main/binary-s390/perl_5.6.1-8.7_s390.deb
stable/main/binary-s390/perl-suid_5.6.1-8.7_s390.deb
stable/main/binary-s390/perl-debug_5.6.1-8.7_s390.deb
perl (5.6.1-8.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for
    CAN-2003-0618


stable/main/binary-powerpc/perl-suid_5.6.1-8.7_powerpc.deb
stable/main/binary-powerpc/perl-debug_5.6.1-8.7_powerpc.deb
stable/main/binary-powerpc/perl-base_5.6.1-8.7_powerpc.deb
stable/main/binary-powerpc/libperl-dev_5.6.1-8.7_powerpc.deb
stable/main/binary-powerpc/perl_5.6.1-8.7_powerpc.deb
stable/main/binary-powerpc/libperl5.6_5.6.1-8.7_powerpc.deb
perl (5.6.1-8.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for
    CAN-2003-0618


stable/main/binary-mipsel/perl_5.6.1-8.7_mipsel.deb
stable/main/binary-mipsel/perl-base_5.6.1-8.7_mipsel.deb
stable/main/binary-mipsel/libperl-dev_5.6.1-8.7_mipsel.deb
stable/main/binary-mipsel/perl-suid_5.6.1-8.7_mipsel.deb
stable/main/binary-mipsel/perl-debug_5.6.1-8.7_mipsel.deb
stable/main/binary-mipsel/libperl5.6_5.6.1-8.7_mipsel.deb
perl (5.6.1-8.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for
    CAN-2003-0618


stable/main/binary-mips/perl-base_5.6.1-8.7_mips.deb
stable/main/binary-mips/perl-suid_5.6.1-8.7_mips.deb
stable/main/binary-mips/perl-debug_5.6.1-8.7_mips.deb
stable/main/binary-mips/libperl5.6_5.6.1-8.7_mips.deb
stable/main/binary-mips/libperl-dev_5.6.1-8.7_mips.deb
stable/main/binary-mips/perl_5.6.1-8.7_mips.deb
perl (5.6.1-8.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for
    CAN-2003-0618


stable/main/binary-m68k/perl_5.6.1-8.7_m68k.deb
stable/main/binary-m68k/libperl5.6_5.6.1-8.7_m68k.deb
stable/main/binary-m68k/perl-suid_5.6.1-8.7_m68k.deb
stable/main/binary-m68k/libperl-dev_5.6.1-8.7_m68k.deb
stable/main/binary-m68k/perl-base_5.6.1-8.7_m68k.deb
stable/main/binary-m68k/perl-debug_5.6.1-8.7_m68k.deb
perl (5.6.1-8.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for
    CAN-2003-0618


stable/main/binary-ia64/perl-suid_5.6.1-8.7_ia64.deb
stable/main/binary-ia64/libperl-dev_5.6.1-8.7_ia64.deb
stable/main/binary-ia64/perl-base_5.6.1-8.7_ia64.deb
stable/main/binary-ia64/perl-debug_5.6.1-8.7_ia64.deb
stable/main/binary-ia64/libperl5.6_5.6.1-8.7_ia64.deb
stable/main/binary-ia64/perl_5.6.1-8.7_ia64.deb
perl (5.6.1-8.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for
    CAN-2003-0618


stable/main/binary-hppa/libperl5.6_5.6.1-8.7_hppa.deb
stable/main/binary-hppa/perl_5.6.1-8.7_hppa.deb
stable/main/binary-hppa/perl-suid_5.6.1-8.7_hppa.deb
stable/main/binary-hppa/perl-base_5.6.1-8.7_hppa.deb
stable/main/binary-hppa/perl-debug_5.6.1-8.7_hppa.deb
stable/main/binary-hppa/libperl-dev_5.6.1-8.7_hppa.deb
perl (5.6.1-8.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for
    CAN-2003-0618


stable/main/binary-arm/libperl5.6_5.6.1-8.7_arm.deb
stable/main/binary-arm/perl-suid_5.6.1-8.7_arm.deb
stable/main/binary-arm/perl_5.6.1-8.7_arm.deb
stable/main/binary-arm/libperl-dev_5.6.1-8.7_arm.deb
stable/main/binary-arm/perl-debug_5.6.1-8.7_arm.deb
stable/main/binary-arm/perl-base_5.6.1-8.7_arm.deb
perl (5.6.1-8.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for
    CAN-2003-0618


stable/main/binary-alpha/perl-base_5.6.1-8.7_alpha.deb
stable/main/binary-alpha/libperl-dev_5.6.1-8.7_alpha.deb
stable/main/binary-alpha/perl_5.6.1-8.7_alpha.deb
stable/main/binary-alpha/libperl5.6_5.6.1-8.7_alpha.deb
stable/main/binary-alpha/perl-suid_5.6.1-8.7_alpha.deb
stable/main/binary-alpha/perl-debug_5.6.1-8.7_alpha.deb
perl (5.6.1-8.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for
    CAN-2003-0618


stable/main/binary-all/perl-modules_5.6.1-8.7_all.deb
stable/main/binary-i386/libperl-dev_5.6.1-8.7_i386.deb
stable/main/binary-all/libcgi-fast-perl_5.6.1-8.7_all.deb
stable/main/source/perl_5.6.1-8.7.dsc
stable/main/binary-i386/perl_5.6.1-8.7_i386.deb
stable/main/binary-all/perl-doc_5.6.1-8.7_all.deb
stable/main/binary-i386/perl-debug_5.6.1-8.7_i386.deb
stable/main/source/perl_5.6.1-8.7.diff.gz
stable/main/binary-i386/perl-base_5.6.1-8.7_i386.deb
stable/main/binary-i386/perl-suid_5.6.1-8.7_i386.deb
stable/main/binary-i386/libperl5.6_5.6.1-8.7_i386.deb
perl (5.6.1-8.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated 20_fix_suidperl from Brendan O'Dea with yet more complete fix for
    CAN-2003-0618


stable/main/binary-sparc/osh_1.7-11woody1_sparc.deb
osh (1.7-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflows (#168383)


stable/main/binary-s390/osh_1.7-11woody1_s390.deb
osh (1.7-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflows (#168383)


stable/main/binary-powerpc/osh_1.7-11woody1_powerpc.deb
osh (1.7-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflows (#168383)


stable/main/binary-mipsel/osh_1.7-11woody1_mipsel.deb
osh (1.7-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflows (#168383)


stable/main/binary-mips/osh_1.7-11woody1_mips.deb
osh (1.7-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflows (#168383)


stable/main/binary-m68k/osh_1.7-11woody1_m68k.deb
osh (1.7-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflows (#168383)


stable/main/binary-ia64/osh_1.7-11woody1_ia64.deb
osh (1.7-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflows (#168383)


stable/main/binary-hppa/osh_1.7-11woody1_hppa.deb
osh (1.7-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflows (#168383)


stable/main/binary-arm/osh_1.7-11woody1_arm.deb
osh (1.7-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflows (#168383)


stable/main/binary-alpha/osh_1.7-11woody1_alpha.deb
osh (1.7-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflows (#168383)


stable/main/source/osh_1.7-11woody1.dsc
stable/main/source/osh_1.7-11woody1.diff.gz
stable/main/binary-i386/osh_1.7-11woody1_i386.deb
osh (1.7-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflows (#168383)


stable/main/binary-sparc/libssl-dev_0.9.6c-2.woody.6_sparc.deb
stable/main/binary-sparc/libssl0.9.6_0.9.6c-2.woody.6_sparc.deb
stable/main/binary-sparc/openssl_0.9.6c-2.woody.6_sparc.deb
openssl (0.9.6c-2.woody.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service (infinite loop)
    (CAN-2004-0081)


stable/main/binary-s390/libssl0.9.6_0.9.6c-2.woody.6_s390.deb
stable/main/binary-s390/libssl-dev_0.9.6c-2.woody.6_s390.deb
stable/main/binary-s390/openssl_0.9.6c-2.woody.6_s390.deb
openssl (0.9.6c-2.woody.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service (infinite loop)
    (CAN-2004-0081)


stable/main/binary-powerpc/libssl-dev_0.9.6c-2.woody.6_powerpc.deb
stable/main/binary-powerpc/openssl_0.9.6c-2.woody.6_powerpc.deb
stable/main/binary-powerpc/libssl0.9.6_0.9.6c-2.woody.6_powerpc.deb
openssl (0.9.6c-2.woody.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service (infinite loop)
    (CAN-2004-0081)


stable/main/binary-mipsel/libssl-dev_0.9.6c-2.woody.6_mipsel.deb
stable/main/binary-mipsel/openssl_0.9.6c-2.woody.6_mipsel.deb
stable/main/binary-mipsel/libssl0.9.6_0.9.6c-2.woody.6_mipsel.deb
openssl (0.9.6c-2.woody.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service (infinite loop)
    (CAN-2004-0081)


stable/main/binary-mips/libssl0.9.6_0.9.6c-2.woody.6_mips.deb
stable/main/binary-mips/openssl_0.9.6c-2.woody.6_mips.deb
stable/main/binary-mips/libssl-dev_0.9.6c-2.woody.6_mips.deb
openssl (0.9.6c-2.woody.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service (infinite loop)
    (CAN-2004-0081)


stable/main/binary-m68k/openssl_0.9.6c-2.woody.6_m68k.deb
stable/main/binary-m68k/libssl0.9.6_0.9.6c-2.woody.6_m68k.deb
stable/main/binary-m68k/libssl-dev_0.9.6c-2.woody.6_m68k.deb
openssl (0.9.6c-2.woody.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service (infinite loop)
    (CAN-2004-0081)


stable/main/binary-ia64/libssl0.9.6_0.9.6c-2.woody.6_ia64.deb
stable/main/binary-ia64/libssl-dev_0.9.6c-2.woody.6_ia64.deb
stable/main/binary-ia64/openssl_0.9.6c-2.woody.6_ia64.deb
openssl (0.9.6c-2.woody.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service (infinite loop)
    (CAN-2004-0081)


stable/main/binary-hppa/libssl0.9.6_0.9.6c-2.woody.6_hppa.deb
stable/main/binary-hppa/libssl-dev_0.9.6c-2.woody.6_hppa.deb
stable/main/binary-hppa/openssl_0.9.6c-2.woody.6_hppa.deb
openssl (0.9.6c-2.woody.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service (infinite loop)
    (CAN-2004-0081)


stable/main/binary-arm/libssl-dev_0.9.6c-2.woody.6_arm.deb
stable/main/binary-arm/libssl0.9.6_0.9.6c-2.woody.6_arm.deb
stable/main/binary-arm/openssl_0.9.6c-2.woody.6_arm.deb
openssl (0.9.6c-2.woody.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service (infinite loop)
    (CAN-2004-0081)


stable/main/binary-alpha/libssl0.9.6_0.9.6c-2.woody.6_alpha.deb
stable/main/binary-alpha/libssl-dev_0.9.6c-2.woody.6_alpha.deb
stable/main/binary-alpha/openssl_0.9.6c-2.woody.6_alpha.deb
openssl (0.9.6c-2.woody.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service (infinite loop)
    (CAN-2004-0081)


stable/main/binary-i386/libssl-dev_0.9.6c-2.woody.6_i386.deb
stable/main/binary-i386/openssl_0.9.6c-2.woody.6_i386.deb
stable/main/source/openssl_0.9.6c-2.woody.6.dsc
stable/main/binary-all/ssleay_0.9.6c-2.woody.6_all.deb
stable/main/binary-i386/libssl0.9.6_0.9.6c-2.woody.6_i386.deb
stable/main/source/openssl_0.9.6c-2.woody.6.diff.gz
openssl (0.9.6c-2.woody.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service (infinite loop)
    (CAN-2004-0081)


stable/main/binary-sparc/noffle_1.0.1-1.1.woody.2_sparc.deb
noffle (1.0.1-1.1.woody.2) stable; urgency=medium
  * Let noffle switch to news:news on startup when root is calling,
    prevents root exploits and bad ownerships in the spool directory,
    e.g. when running 'noffle --query' as root, closes: #168128.


stable/main/binary-s390/noffle_1.0.1-1.1.woody.2_s390.deb
noffle (1.0.1-1.1.woody.2) stable; urgency=medium
  * Let noffle switch to news:news on startup when root is calling,
    prevents root exploits and bad ownerships in the spool directory,
    e.g. when running 'noffle --query' as root, closes: #168128.


stable/main/binary-powerpc/noffle_1.0.1-1.1.woody.2_powerpc.deb
noffle (1.0.1-1.1.woody.2) stable; urgency=medium
  * Let noffle switch to news:news on startup when root is calling,
    prevents root exploits and bad ownerships in the spool directory,
    e.g. when running 'noffle --query' as root, closes: #168128.


stable/main/binary-mipsel/noffle_1.0.1-1.1.woody.2_mipsel.deb
noffle (1.0.1-1.1.woody.2) stable; urgency=medium
  * Let noffle switch to news:news on startup when root is calling,
    prevents root exploits and bad ownerships in the spool directory,
    e.g. when running 'noffle --query' as root, closes: #168128.


stable/main/binary-mips/noffle_1.0.1-1.1.woody.2_mips.deb
noffle (1.0.1-1.1.woody.2) stable; urgency=medium
  * Let noffle switch to news:news on startup when root is calling,
    prevents root exploits and bad ownerships in the spool directory,
    e.g. when running 'noffle --query' as root, closes: #168128.


stable/main/binary-m68k/noffle_1.0.1-1.1.woody.2_m68k.deb
noffle (1.0.1-1.1.woody.2) stable; urgency=medium
  * Let noffle switch to news:news on startup when root is calling,
    prevents root exploits and bad ownerships in the spool directory,
    e.g. when running 'noffle --query' as root, closes: #168128.


stable/main/binary-ia64/noffle_1.0.1-1.1.woody.2_ia64.deb
noffle (1.0.1-1.1.woody.2) stable; urgency=medium
  * Let noffle switch to news:news on startup when root is calling,
    prevents root exploits and bad ownerships in the spool directory,
    e.g. when running 'noffle --query' as root, closes: #168128.


stable/main/binary-hppa/noffle_1.0.1-1.1.woody.2_hppa.deb
noffle (1.0.1-1.1.woody.2) stable; urgency=medium
  * Let noffle switch to news:news on startup when root is calling,
    prevents root exploits and bad ownerships in the spool directory,
    e.g. when running 'noffle --query' as root, closes: #168128.


stable/main/binary-arm/noffle_1.0.1-1.1.woody.2_arm.deb
noffle (1.0.1-1.1.woody.2) stable; urgency=medium
  * Let noffle switch to news:news on startup when root is calling,
    prevents root exploits and bad ownerships in the spool directory,
    e.g. when running 'noffle --query' as root, closes: #168128.


stable/main/binary-alpha/noffle_1.0.1-1.1.woody.2_alpha.deb
noffle (1.0.1-1.1.woody.2) stable; urgency=medium
  * Let noffle switch to news:news on startup when root is calling,
    prevents root exploits and bad ownerships in the spool directory,
    e.g. when running 'noffle --query' as root, closes: #168128.


stable/main/source/noffle_1.0.1-1.1.woody.2.dsc
stable/main/binary-i386/noffle_1.0.1-1.1.woody.2_i386.deb
stable/main/source/noffle_1.0.1-1.1.woody.2.diff.gz
noffle (1.0.1-1.1.woody.2) stable; urgency=medium
  * Let noffle switch to news:news on startup when root is calling,
    prevents root exploits and bad ownerships in the spool directory,
    e.g. when running 'noffle --query' as root, closes: #168128.


stable/main/binary-sparc/telnetd-ssl_0.17.17+0.1-2woody2_sparc.deb
stable/main/binary-sparc/telnet-ssl_0.17.17+0.1-2woody2_sparc.deb
netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low
  * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu.


stable/main/binary-s390/telnetd-ssl_0.17.17+0.1-2woody2_s390.deb
stable/main/binary-s390/telnet-ssl_0.17.17+0.1-2woody2_s390.deb
netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low
  * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu.


stable/main/binary-powerpc/telnet-ssl_0.17.17+0.1-2woody2_powerpc.deb
stable/main/binary-powerpc/telnetd-ssl_0.17.17+0.1-2woody2_powerpc.deb
netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low
  * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu.


stable/main/binary-mipsel/telnetd-ssl_0.17.17+0.1-2woody2_mipsel.deb
stable/main/binary-mipsel/telnet-ssl_0.17.17+0.1-2woody2_mipsel.deb
netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low
  * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu.


stable/main/binary-mips/telnetd-ssl_0.17.17+0.1-2woody2_mips.deb
stable/main/binary-mips/telnet-ssl_0.17.17+0.1-2woody2_mips.deb
netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low
  * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu.


stable/main/binary-m68k/telnet-ssl_0.17.17+0.1-2woody2_m68k.deb
stable/main/binary-m68k/telnetd-ssl_0.17.17+0.1-2woody2_m68k.deb
netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low
  * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu.


stable/main/binary-ia64/telnetd-ssl_0.17.17+0.1-2woody2_ia64.deb
stable/main/binary-ia64/telnet-ssl_0.17.17+0.1-2woody2_ia64.deb
netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low
  * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu.


stable/main/binary-hppa/telnetd-ssl_0.17.17+0.1-2woody2_hppa.deb
stable/main/binary-hppa/telnet-ssl_0.17.17+0.1-2woody2_hppa.deb
netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low
  * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu.


stable/main/binary-arm/telnet-ssl_0.17.17+0.1-2woody2_arm.deb
stable/main/binary-arm/telnetd-ssl_0.17.17+0.1-2woody2_arm.deb
netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low
  * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu.


stable/main/binary-alpha/telnet-ssl_0.17.17+0.1-2woody2_alpha.deb
stable/main/binary-alpha/telnetd-ssl_0.17.17+0.1-2woody2_alpha.deb
netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low
  * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu.


stable/main/source/netkit-telnet-ssl_0.17.17+0.1-2woody2.dsc
stable/main/binary-i386/telnet-ssl_0.17.17+0.1-2woody2_i386.deb
stable/main/binary-i386/telnetd-ssl_0.17.17+0.1-2woody2_i386.deb
stable/main/source/netkit-telnet-ssl_0.17.17+0.1-2woody2.diff.gz
netkit-telnet-ssl (0.17.17+0.1-2woody2) stable-security; urgency=low
  * telnetd/utility.c: Fix remote DOS hole (CAN-2004-0911). Thanks Herbert Xu.


stable/main/binary-sparc/telnetd_0.17-18woody2_sparc.deb
stable/main/binary-sparc/telnet_0.17-18woody2_sparc.deb
netkit-telnet (0.17-18woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Really applied the patch by Herbert Xu to fix DoS and possibly worse
    [telnetd/utility.c, CAN-2004-0911]


stable/main/binary-s390/telnetd_0.17-18woody2_s390.deb
stable/main/binary-s390/telnet_0.17-18woody2_s390.deb
netkit-telnet (0.17-18woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Really applied the patch by Herbert Xu to fix DoS and possibly worse
    [telnetd/utility.c, CAN-2004-0911]


stable/main/binary-powerpc/telnet_0.17-18woody2_powerpc.deb
stable/main/binary-powerpc/telnetd_0.17-18woody2_powerpc.deb
netkit-telnet (0.17-18woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Really applied the patch by Herbert Xu to fix DoS and possibly worse
    [telnetd/utility.c, CAN-2004-0911]


stable/main/binary-mipsel/telnetd_0.17-18woody2_mipsel.deb
stable/main/binary-mipsel/telnet_0.17-18woody2_mipsel.deb
netkit-telnet (0.17-18woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Really applied the patch by Herbert Xu to fix DoS and possibly worse
    [telnetd/utility.c, CAN-2004-0911]


stable/main/binary-mips/telnetd_0.17-18woody2_mips.deb
stable/main/binary-mips/telnet_0.17-18woody2_mips.deb
netkit-telnet (0.17-18woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Really applied the patch by Herbert Xu to fix DoS and possibly worse
    [telnetd/utility.c, CAN-2004-0911]


stable/main/binary-m68k/telnet_0.17-18woody2_m68k.deb
stable/main/binary-m68k/telnetd_0.17-18woody2_m68k.deb
netkit-telnet (0.17-18woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Really applied the patch by Herbert Xu to fix DoS and possibly worse
    [telnetd/utility.c, CAN-2004-0911]


stable/main/binary-ia64/telnetd_0.17-18woody2_ia64.deb
stable/main/binary-ia64/telnet_0.17-18woody2_ia64.deb
netkit-telnet (0.17-18woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Really applied the patch by Herbert Xu to fix DoS and possibly worse
    [telnetd/utility.c, CAN-2004-0911]


stable/main/binary-hppa/telnetd_0.17-18woody2_hppa.deb
stable/main/binary-hppa/telnet_0.17-18woody2_hppa.deb
netkit-telnet (0.17-18woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Really applied the patch by Herbert Xu to fix DoS and possibly worse
    [telnetd/utility.c, CAN-2004-0911]


stable/main/binary-arm/telnet_0.17-18woody2_arm.deb
stable/main/binary-arm/telnetd_0.17-18woody2_arm.deb
netkit-telnet (0.17-18woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Really applied the patch by Herbert Xu to fix DoS and possibly worse
    [telnetd/utility.c, CAN-2004-0911]


stable/main/binary-alpha/telnet_0.17-18woody2_alpha.deb
stable/main/binary-alpha/telnetd_0.17-18woody2_alpha.deb
netkit-telnet (0.17-18woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Really applied the patch by Herbert Xu to fix DoS and possibly worse
    [telnetd/utility.c, CAN-2004-0911]


stable/main/binary-i386/telnet_0.17-18woody2_i386.deb
stable/main/source/netkit-telnet_0.17-18woody2.dsc
stable/main/binary-i386/telnetd_0.17-18woody2_i386.deb
stable/main/source/netkit-telnet_0.17-18woody2.diff.gz
netkit-telnet (0.17-18woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Really applied the patch by Herbert Xu to fix DoS and possibly worse
    [telnetd/utility.c, CAN-2004-0911]


stable/main/binary-sparc/nethack-common_3.4.0-3.0woody4_sparc.deb
stable/main/binary-sparc/nethack-x11_3.4.0-3.0woody4_sparc.deb
stable/main/binary-sparc/nethack-qt_3.4.0-3.0woody4_sparc.deb
stable/main/binary-sparc/nethack-gnome_3.4.0-3.0woody4_sparc.deb
nethack (3.4.0-3.0woody4) stable; urgency=medium
  * Stable upload; this upload is solely to recompile with gcc-3.0.
  * Add Build-Depends on gcc-3.0 to fix compiler issue that caused
    invisible doors on alpha architecture.  (Closes: #71455)


stable/main/binary-s390/nethack-gnome_3.4.0-3.0woody4_s390.deb
stable/main/binary-s390/nethack-qt_3.4.0-3.0woody4_s390.deb
stable/main/binary-s390/nethack-common_3.4.0-3.0woody4_s390.deb
stable/main/binary-s390/nethack-x11_3.4.0-3.0woody4_s390.deb
nethack (3.4.0-3.0woody4) stable; urgency=medium
  * Stable upload; this upload is solely to recompile with gcc-3.0.
  * Add Build-Depends on gcc-3.0 to fix compiler issue that caused
    invisible doors on alpha architecture.  (Closes: #71455)


stable/main/binary-powerpc/nethack-gnome_3.4.0-3.0woody4_powerpc.deb
stable/main/binary-powerpc/nethack-common_3.4.0-3.0woody4_powerpc.deb
stable/main/binary-powerpc/nethack-x11_3.4.0-3.0woody4_powerpc.deb
stable/main/binary-powerpc/nethack-qt_3.4.0-3.0woody4_powerpc.deb
nethack (3.4.0-3.0woody4) stable; urgency=medium
  * Stable upload; this upload is solely to recompile with gcc-3.0.
  * Add Build-Depends on gcc-3.0 to fix compiler issue that caused
    invisible doors on alpha architecture.  (Closes: #71455)


stable/main/binary-mipsel/nethack-common_3.4.0-3.0woody4_mipsel.deb
stable/main/binary-mipsel/nethack-qt_3.4.0-3.0woody4_mipsel.deb
stable/main/binary-mipsel/nethack-x11_3.4.0-3.0woody4_mipsel.deb
stable/main/binary-mipsel/nethack-gnome_3.4.0-3.0woody4_mipsel.deb
nethack (3.4.0-3.0woody4) stable; urgency=medium
  * Stable upload; this upload is solely to recompile with gcc-3.0.
  * Add Build-Depends on gcc-3.0 to fix compiler issue that caused
    invisible doors on alpha architecture.  (Closes: #71455)


stable/main/binary-mips/nethack-qt_3.4.0-3.0woody4_mips.deb
stable/main/binary-mips/nethack-common_3.4.0-3.0woody4_mips.deb
stable/main/binary-mips/nethack-gnome_3.4.0-3.0woody4_mips.deb
stable/main/binary-mips/nethack-x11_3.4.0-3.0woody4_mips.deb
nethack (3.4.0-3.0woody4) stable; urgency=medium
  * Stable upload; this upload is solely to recompile with gcc-3.0.
  * Add Build-Depends on gcc-3.0 to fix compiler issue that caused
    invisible doors on alpha architecture.  (Closes: #71455)


stable/main/binary-m68k/nethack-x11_3.4.0-3.0woody4_m68k.deb
stable/main/binary-m68k/nethack-common_3.4.0-3.0woody4_m68k.deb
stable/main/binary-m68k/nethack-qt_3.4.0-3.0woody4_m68k.deb
stable/main/binary-m68k/nethack-gnome_3.4.0-3.0woody4_m68k.deb
nethack (3.4.0-3.0woody4) stable; urgency=medium
  * Stable upload; this upload is solely to recompile with gcc-3.0.
  * Add Build-Depends on gcc-3.0 to fix compiler issue that caused
    invisible doors on alpha architecture.  (Closes: #71455)


stable/main/binary-hppa/nethack-qt_3.4.0-3.0woody4_hppa.deb
stable/main/binary-hppa/nethack-x11_3.4.0-3.0woody4_hppa.deb
stable/main/binary-hppa/nethack-common_3.4.0-3.0woody4_hppa.deb
stable/main/binary-hppa/nethack-gnome_3.4.0-3.0woody4_hppa.deb
nethack (3.4.0-3.0woody4) stable; urgency=medium
  * Stable upload; this upload is solely to recompile with gcc-3.0.
  * Add Build-Depends on gcc-3.0 to fix compiler issue that caused
    invisible doors on alpha architecture.  (Closes: #71455)


stable/main/binary-arm/nethack-x11_3.4.0-3.0woody4_arm.deb
stable/main/binary-arm/nethack-qt_3.4.0-3.0woody4_arm.deb
stable/main/binary-arm/nethack-common_3.4.0-3.0woody4_arm.deb
stable/main/binary-arm/nethack-gnome_3.4.0-3.0woody4_arm.deb
nethack (3.4.0-3.0woody4) stable; urgency=medium
  * Stable upload; this upload is solely to recompile with gcc-3.0.
  * Add Build-Depends on gcc-3.0 to fix compiler issue that caused
    invisible doors on alpha architecture.  (Closes: #71455)


stable/main/binary-alpha/nethack-common_3.4.0-3.0woody4_alpha.deb
stable/main/binary-alpha/nethack-qt_3.4.0-3.0woody4_alpha.deb
stable/main/binary-alpha/nethack-gnome_3.4.0-3.0woody4_alpha.deb
stable/main/binary-alpha/nethack-x11_3.4.0-3.0woody4_alpha.deb
nethack (3.4.0-3.0woody4) stable; urgency=medium
  * Stable upload; this upload is solely to recompile with gcc-3.0.
  * Add Build-Depends on gcc-3.0 to fix compiler issue that caused
    invisible doors on alpha architecture.  (Closes: #71455)


stable/main/binary-i386/nethack-gnome_3.4.0-3.0woody4_i386.deb
stable/main/binary-i386/nethack-qt_3.4.0-3.0woody4_i386.deb
stable/main/source/nethack_3.4.0-3.0woody4.diff.gz
stable/main/binary-i386/nethack-common_3.4.0-3.0woody4_i386.deb
stable/main/binary-i386/nethack-x11_3.4.0-3.0woody4_i386.deb
stable/main/binary-all/nethack_3.4.0-3.0woody4_all.deb
stable/main/source/nethack_3.4.0-3.0woody4.dsc
nethack (3.4.0-3.0woody4) stable; urgency=medium
  * Stable upload; this upload is solely to recompile with gcc-3.0.
  * Add Build-Depends on gcc-3.0 to fix compiler issue that caused
    invisible doors on alpha architecture.  (Closes: #71455)


stable/main/binary-sparc/net-acct_0.71-5woody1_sparc.deb
net-acct (0.71-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Richard Clark to remove insecure temporary file
    creation [src/process.c, CAN-2004-0851,
    http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch]


stable/main/binary-s390/net-acct_0.71-5woody1_s390.deb
net-acct (0.71-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Richard Clark to remove insecure temporary file
    creation [src/process.c, CAN-2004-0851,
    http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch]


stable/main/binary-powerpc/net-acct_0.71-5woody1_powerpc.deb
net-acct (0.71-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Richard Clark to remove insecure temporary file
    creation [src/process.c, CAN-2004-0851,
    http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch]


stable/main/binary-mipsel/net-acct_0.71-5woody1_mipsel.deb
net-acct (0.71-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Richard Clark to remove insecure temporary file
    creation [src/process.c, CAN-2004-0851,
    http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch]


stable/main/binary-mips/net-acct_0.71-5woody1_mips.deb
net-acct (0.71-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Richard Clark to remove insecure temporary file
    creation [src/process.c, CAN-2004-0851,
    http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch]


stable/main/binary-m68k/net-acct_0.71-5woody1_m68k.deb
net-acct (0.71-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Richard Clark to remove insecure temporary file
    creation [src/process.c, CAN-2004-0851,
    http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch]


stable/main/binary-ia64/net-acct_0.71-5woody1_ia64.deb
net-acct (0.71-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Richard Clark to remove insecure temporary file
    creation [src/process.c, CAN-2004-0851,
    http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch]


stable/main/binary-hppa/net-acct_0.71-5woody1_hppa.deb
net-acct (0.71-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Richard Clark to remove insecure temporary file
    creation [src/process.c, CAN-2004-0851,
    http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch]


stable/main/binary-arm/net-acct_0.71-5woody1_arm.deb
net-acct (0.71-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Richard Clark to remove insecure temporary file
    creation [src/process.c, CAN-2004-0851,
    http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch]


stable/main/binary-alpha/net-acct_0.71-5woody1_alpha.deb
net-acct (0.71-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Richard Clark to remove insecure temporary file
    creation [src/process.c, CAN-2004-0851,
    http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch]


stable/main/source/net-acct_0.71-5woody1.dsc
stable/main/source/net-acct_0.71-5woody1.diff.gz
stable/main/binary-i386/net-acct_0.71-5woody1_i386.deb
net-acct (0.71-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Richard Clark to remove insecure temporary file
    creation [src/process.c, CAN-2004-0851,
    http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch]


stable/main/binary-sparc/libneon-dev_0.19.3-2woody5_sparc.deb
stable/main/binary-sparc/libneon19_0.19.3-2woody5_sparc.deb
neon (0.19.3-2woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied part of an upstream patch by Joe Orton <joe@manyfish.co.uk> to
    correct the weekdays buffer to properly fix a potential stack overflow
    via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398]


stable/main/binary-s390/libneon-dev_0.19.3-2woody5_s390.deb
stable/main/binary-s390/libneon19_0.19.3-2woody5_s390.deb
neon (0.19.3-2woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied part of an upstream patch by Joe Orton <joe@manyfish.co.uk> to
    correct the weekdays buffer to properly fix a potential stack overflow
    via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398]


stable/main/binary-powerpc/libneon-dev_0.19.3-2woody5_powerpc.deb
stable/main/binary-powerpc/libneon19_0.19.3-2woody5_powerpc.deb
neon (0.19.3-2woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied part of an upstream patch by Joe Orton <joe@manyfish.co.uk> to
    correct the weekdays buffer to properly fix a potential stack overflow
    via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398]


stable/main/binary-mipsel/libneon-dev_0.19.3-2woody5_mipsel.deb
stable/main/binary-mipsel/libneon19_0.19.3-2woody5_mipsel.deb
neon (0.19.3-2woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied part of an upstream patch by Joe Orton <joe@manyfish.co.uk> to
    correct the weekdays buffer to properly fix a potential stack overflow
    via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398]


stable/main/binary-mips/libneon-dev_0.19.3-2woody5_mips.deb
stable/main/binary-mips/libneon19_0.19.3-2woody5_mips.deb
neon (0.19.3-2woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied part of an upstream patch by Joe Orton <joe@manyfish.co.uk> to
    correct the weekdays buffer to properly fix a potential stack overflow
    via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398]


stable/main/binary-m68k/libneon19_0.19.3-2woody5_m68k.deb
stable/main/binary-m68k/libneon-dev_0.19.3-2woody5_m68k.deb
neon (0.19.3-2woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied part of an upstream patch by Joe Orton <joe@manyfish.co.uk> to
    correct the weekdays buffer to properly fix a potential stack overflow
    via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398]


stable/main/binary-ia64/libneon-dev_0.19.3-2woody5_ia64.deb
stable/main/binary-ia64/libneon19_0.19.3-2woody5_ia64.deb
neon (0.19.3-2woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied part of an upstream patch by Joe Orton <joe@manyfish.co.uk> to
    correct the weekdays buffer to properly fix a potential stack overflow
    via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398]


stable/main/binary-hppa/libneon-dev_0.19.3-2woody5_hppa.deb
stable/main/binary-hppa/libneon19_0.19.3-2woody5_hppa.deb
neon (0.19.3-2woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied part of an upstream patch by Joe Orton <joe@manyfish.co.uk> to
    correct the weekdays buffer to properly fix a potential stack overflow
    via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398]


stable/main/binary-arm/libneon19_0.19.3-2woody5_arm.deb
stable/main/binary-arm/libneon-dev_0.19.3-2woody5_arm.deb
neon (0.19.3-2woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied part of an upstream patch by Joe Orton <joe@manyfish.co.uk> to
    correct the weekdays buffer to properly fix a potential stack overflow
    via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398]


stable/main/binary-alpha/libneon19_0.19.3-2woody5_alpha.deb
stable/main/binary-alpha/libneon-dev_0.19.3-2woody5_alpha.deb
neon (0.19.3-2woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied part of an upstream patch by Joe Orton <joe@manyfish.co.uk> to
    correct the weekdays buffer to properly fix a potential stack overflow
    via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398]


stable/main/binary-i386/libneon19_0.19.3-2woody5_i386.deb
stable/main/source/neon_0.19.3-2woody5.diff.gz
stable/main/source/neon_0.19.3-2woody5.dsc
stable/main/binary-i386/libneon-dev_0.19.3-2woody5_i386.deb
neon (0.19.3-2woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied part of an upstream patch by Joe Orton <joe@manyfish.co.uk> to
    correct the weekdays buffer to properly fix a potential stack overflow
    via revision date in REPORT query [src/ne_dates.c, CAN-2004-0398]


stable/main/binary-sparc/nd_0.5.0-1woody1_sparc.deb
nd (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patches from Fumitoshi UKAI <ukai@debian.or.jp> to fix multiple buffer
    overflows in handling data from the remote server (CAN-2004-0014)
    [nd.c]


stable/main/binary-s390/nd_0.5.0-1woody1_s390.deb
nd (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patches from Fumitoshi UKAI <ukai@debian.or.jp> to fix multiple buffer
    overflows in handling data from the remote server (CAN-2004-0014)
    [nd.c]


stable/main/binary-powerpc/nd_0.5.0-1woody1_powerpc.deb
nd (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patches from Fumitoshi UKAI <ukai@debian.or.jp> to fix multiple buffer
    overflows in handling data from the remote server (CAN-2004-0014)
    [nd.c]


stable/main/binary-mipsel/nd_0.5.0-1woody1_mipsel.deb
nd (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patches from Fumitoshi UKAI <ukai@debian.or.jp> to fix multiple buffer
    overflows in handling data from the remote server (CAN-2004-0014)
    [nd.c]


stable/main/binary-mips/nd_0.5.0-1woody1_mips.deb
nd (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patches from Fumitoshi UKAI <ukai@debian.or.jp> to fix multiple buffer
    overflows in handling data from the remote server (CAN-2004-0014)
    [nd.c]


stable/main/binary-m68k/nd_0.5.0-1woody1_m68k.deb
nd (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patches from Fumitoshi UKAI <ukai@debian.or.jp> to fix multiple buffer
    overflows in handling data from the remote server (CAN-2004-0014)
    [nd.c]


stable/main/binary-ia64/nd_0.5.0-1woody1_ia64.deb
nd (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patches from Fumitoshi UKAI <ukai@debian.or.jp> to fix multiple buffer
    overflows in handling data from the remote server (CAN-2004-0014)
    [nd.c]


stable/main/binary-hppa/nd_0.5.0-1woody1_hppa.deb
nd (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patches from Fumitoshi UKAI <ukai@debian.or.jp> to fix multiple buffer
    overflows in handling data from the remote server (CAN-2004-0014)
    [nd.c]


stable/main/binary-arm/nd_0.5.0-1woody1_arm.deb
nd (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patches from Fumitoshi UKAI <ukai@debian.or.jp> to fix multiple buffer
    overflows in handling data from the remote server (CAN-2004-0014)
    [nd.c]


stable/main/binary-alpha/nd_0.5.0-1woody1_alpha.deb
nd (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patches from Fumitoshi UKAI <ukai@debian.or.jp> to fix multiple buffer
    overflows in handling data from the remote server (CAN-2004-0014)
    [nd.c]


stable/main/source/nd_0.5.0-1woody1.diff.gz
stable/main/source/nd_0.5.0-1woody1.dsc
stable/main/binary-i386/nd_0.5.0-1woody1_i386.deb
nd (0.5.0-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patches from Fumitoshi UKAI <ukai@debian.or.jp> to fix multiple buffer
    overflows in handling data from the remote server (CAN-2004-0014)
    [nd.c]


stable/non-free/binary-sparc/ncompress_4.2.4-9.2_sparc.deb
ncompress (4.2.4-9.2) stable; urgency=high
  * Disallow maxbits less than 10, to avoid data corruption (closes: #220820).


stable/non-free/binary-s390/ncompress_4.2.4-9.2_s390.deb
ncompress (4.2.4-9.2) stable; urgency=high
  * Disallow maxbits less than 10, to avoid data corruption (closes: #220820).


stable/non-free/binary-powerpc/ncompress_4.2.4-9.2_powerpc.deb
ncompress (4.2.4-9.2) stable; urgency=high
  * Disallow maxbits less than 10, to avoid data corruption (closes: #220820).


stable/non-free/binary-m68k/ncompress_4.2.4-9.2_m68k.deb
ncompress (4.2.4-9.2) stable; urgency=high
  * Disallow maxbits less than 10, to avoid data corruption (closes: #220820).


stable/non-free/binary-ia64/ncompress_4.2.4-9.2_ia64.deb
ncompress (4.2.4-9.2) stable; urgency=high
  * Disallow maxbits less than 10, to avoid data corruption (closes: #220820).


stable/non-free/binary-hppa/ncompress_4.2.4-9.2_hppa.deb
ncompress (4.2.4-9.2) stable; urgency=high
  * Disallow maxbits less than 10, to avoid data corruption (closes: #220820).


stable/non-free/binary-arm/ncompress_4.2.4-9.2_arm.deb
ncompress (4.2.4-9.2) stable; urgency=high
  * Disallow maxbits less than 10, to avoid data corruption (closes: #220820).


stable/non-free/binary-alpha/ncompress_4.2.4-9.2_alpha.deb
ncompress (4.2.4-9.2) stable; urgency=high
  * Disallow maxbits less than 10, to avoid data corruption (closes: #220820).


stable/non-free/binary-i386/ncompress_4.2.4-9.2_i386.deb
stable/non-free/source/ncompress_4.2.4-9.2.dsc
stable/non-free/source/ncompress_4.2.4-9.2.diff.gz
ncompress (4.2.4-9.2) stable; urgency=high
  * Disallow maxbits less than 10, to avoid data corruption (closes: #220820).


stable/main/binary-sparc/nbd-server_1.2cvs20020320-3.woody.2_sparc.deb
stable/main/binary-sparc/nbd-client_1.2cvs20020320-3.woody.2_sparc.deb
nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low
  * Remove temporary files in nbd-server's postinst


stable/main/binary-s390/nbd-client_1.2cvs20020320-3.woody.2_s390.deb
stable/main/binary-s390/nbd-server_1.2cvs20020320-3.woody.2_s390.deb
nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low
  * Remove temporary files in nbd-server's postinst


stable/main/binary-powerpc/nbd-server_1.2cvs20020320-3.woody.2_powerpc.deb
stable/main/binary-powerpc/nbd-client_1.2cvs20020320-3.woody.2_powerpc.deb
nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low
  * Remove temporary files in nbd-server's postinst


stable/main/binary-mipsel/nbd-server_1.2cvs20020320-3.woody.2_mipsel.deb
stable/main/binary-mipsel/nbd-client_1.2cvs20020320-3.woody.2_mipsel.deb
nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low
  * Remove temporary files in nbd-server's postinst


stable/main/binary-mips/nbd-server_1.2cvs20020320-3.woody.2_mips.deb
stable/main/binary-mips/nbd-client_1.2cvs20020320-3.woody.2_mips.deb
nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low
  * Remove temporary files in nbd-server's postinst


stable/main/binary-m68k/nbd-client_1.2cvs20020320-3.woody.2_m68k.deb
stable/main/binary-m68k/nbd-server_1.2cvs20020320-3.woody.2_m68k.deb
nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low
  * Remove temporary files in nbd-server's postinst


stable/main/binary-ia64/nbd-server_1.2cvs20020320-3.woody.2_ia64.deb
stable/main/binary-ia64/nbd-client_1.2cvs20020320-3.woody.2_ia64.deb
nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low
  * Remove temporary files in nbd-server's postinst


stable/main/binary-hppa/nbd-server_1.2cvs20020320-3.woody.2_hppa.deb
stable/main/binary-hppa/nbd-client_1.2cvs20020320-3.woody.2_hppa.deb
nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low
  * Remove temporary files in nbd-server's postinst


stable/main/binary-arm/nbd-server_1.2cvs20020320-3.woody.2_arm.deb
stable/main/binary-arm/nbd-client_1.2cvs20020320-3.woody.2_arm.deb
nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low
  * Remove temporary files in nbd-server's postinst


stable/main/binary-alpha/nbd-client_1.2cvs20020320-3.woody.2_alpha.deb
stable/main/binary-alpha/nbd-server_1.2cvs20020320-3.woody.2_alpha.deb
nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low
  * Remove temporary files in nbd-server's postinst


stable/main/source/nbd_1.2cvs20020320-3.woody.2.dsc
stable/main/binary-i386/nbd-server_1.2cvs20020320-3.woody.2_i386.deb
stable/main/binary-i386/nbd-client_1.2cvs20020320-3.woody.2_i386.deb
stable/main/source/nbd_1.2cvs20020320-3.woody.2.diff.gz
nbd (1:1.2cvs20020320-3.woody.2) stable; urgency=low
  * Remove temporary files in nbd-server's postinst


stable/main/binary-sparc/mysql-server_3.23.49-8.8_sparc.deb
stable/main/binary-sparc/libmysqlclient10-dev_3.23.49-8.8_sparc.deb
stable/main/binary-sparc/libmysqlclient10_3.23.49-8.8_sparc.deb
stable/main/binary-sparc/mysql-client_3.23.49-8.8_sparc.deb
mysql (3.23.49-8.8) stable-security; urgency=high
  * Maintainer upload by the Security Team
  * Applied patch to make mysqlhotcopy working again as it was broken by
    the upstream patch for the security problem fixed in 3.23.49-8.7
    [DSA 540 and CAN-2004-0457]
  * Applied patch to fix a minor privilege escalation possibility in the
    "ALTER TABLE ... RENAME" command.
    [http://bugs.mysql.com/3270, CAN-2004-0835]
  * Applied patch to fix a potential memory overrun in mysql_real_connect()
    (which required a compromised DNS server and certain operating systems).
    [http://bugs.mysql.com/4017, CAN-2004-0836]
  * Applied patch to fix a bug that could have resulted in a crash or
    hang of the server if concurrent accesses to MERGE tables (even one
    MERGE table and MyISAM tables) were used,
    [http://bugs.mysql.com/2408, CAN-2004-0837]


stable/main/binary-s390/mysql-server_3.23.49-8.8_s390.deb
stable/main/binary-s390/libmysqlclient10_3.23.49-8.8_s390.deb
stable/main/binary-s390/mysql-client_3.23.49-8.8_s390.deb
stable/main/binary-s390/libmysqlclient10-dev_3.23.49-8.8_s390.deb
mysql (3.23.49-8.8) stable-security; urgency=high
  * Maintainer upload by the Security Team
  * Applied patch to make mysqlhotcopy working again as it was broken by
    the upstream patch for the security problem fixed in 3.23.49-8.7
    [DSA 540 and CAN-2004-0457]
  * Applied patch to fix a minor privilege escalation possibility in the
    "ALTER TABLE ... RENAME" command.
    [http://bugs.mysql.com/3270, CAN-2004-0835]
  * Applied patch to fix a potential memory overrun in mysql_real_connect()
    (which required a compromised DNS server and certain operating systems).
    [http://bugs.mysql.com/4017, CAN-2004-0836]
  * Applied patch to fix a bug that could have resulted in a crash or
    hang of the server if concurrent accesses to MERGE tables (even one
    MERGE table and MyISAM tables) were used,
    [http://bugs.mysql.com/2408, CAN-2004-0837]


stable/main/binary-powerpc/libmysqlclient10-dev_3.23.49-8.8_powerpc.deb
stable/main/binary-powerpc/mysql-client_3.23.49-8.8_powerpc.deb
stable/main/binary-powerpc/libmysqlclient10_3.23.49-8.8_powerpc.deb
stable/main/binary-powerpc/mysql-server_3.23.49-8.8_powerpc.deb
mysql (3.23.49-8.8) stable-security; urgency=high
  * Maintainer upload by the Security Team
  * Applied patch to make mysqlhotcopy working again as it was broken by
    the upstream patch for the security problem fixed in 3.23.49-8.7
    [DSA 540 and CAN-2004-0457]
  * Applied patch to fix a minor privilege escalation possibility in the
    "ALTER TABLE ... RENAME" command.
    [http://bugs.mysql.com/3270, CAN-2004-0835]
  * Applied patch to fix a potential memory overrun in mysql_real_connect()
    (which required a compromised DNS server and certain operating systems).
    [http://bugs.mysql.com/4017, CAN-2004-0836]
  * Applied patch to fix a bug that could have resulted in a crash or
    hang of the server if concurrent accesses to MERGE tables (even one
    MERGE table and MyISAM tables) were used,
    [http://bugs.mysql.com/2408, CAN-2004-0837]


stable/main/binary-mipsel/libmysqlclient10_3.23.49-8.8_mipsel.deb
stable/main/binary-mipsel/libmysqlclient10-dev_3.23.49-8.8_mipsel.deb
stable/main/binary-mipsel/mysql-server_3.23.49-8.8_mipsel.deb
stable/main/binary-mipsel/mysql-client_3.23.49-8.8_mipsel.deb
mysql (3.23.49-8.8) stable-security; urgency=high
  * Maintainer upload by the Security Team
  * Applied patch to make mysqlhotcopy working again as it was broken by
    the upstream patch for the security problem fixed in 3.23.49-8.7
    [DSA 540 and CAN-2004-0457]
  * Applied patch to fix a minor privilege escalation possibility in the
    "ALTER TABLE ... RENAME" command.
    [http://bugs.mysql.com/3270, CAN-2004-0835]
  * Applied patch to fix a potential memory overrun in mysql_real_connect()
    (which required a compromised DNS server and certain operating systems).
    [http://bugs.mysql.com/4017, CAN-2004-0836]
  * Applied patch to fix a bug that could have resulted in a crash or
    hang of the server if concurrent accesses to MERGE tables (even one
    MERGE table and MyISAM tables) were used,
    [http://bugs.mysql.com/2408, CAN-2004-0837]


stable/main/binary-mips/mysql-client_3.23.49-8.8_mips.deb
stable/main/binary-mips/libmysqlclient10-dev_3.23.49-8.8_mips.deb
stable/main/binary-mips/libmysqlclient10_3.23.49-8.8_mips.deb
stable/main/binary-mips/mysql-server_3.23.49-8.8_mips.deb
mysql (3.23.49-8.8) stable-security; urgency=high
  * Maintainer upload by the Security Team
  * Applied patch to make mysqlhotcopy working again as it was broken by
    the upstream patch for the security problem fixed in 3.23.49-8.7
    [DSA 540 and CAN-2004-0457]
  * Applied patch to fix a minor privilege escalation possibility in the
    "ALTER TABLE ... RENAME" command.
    [http://bugs.mysql.com/3270, CAN-2004-0835]
  * Applied patch to fix a potential memory overrun in mysql_real_connect()
    (which required a compromised DNS server and certain operating systems).
    [http://bugs.mysql.com/4017, CAN-2004-0836]
  * Applied patch to fix a bug that could have resulted in a crash or
    hang of the server if concurrent accesses to MERGE tables (even one
    MERGE table and MyISAM tables) were used,
    [http://bugs.mysql.com/2408, CAN-2004-0837]


stable/main/binary-m68k/libmysqlclient10-dev_3.23.49-8.8_m68k.deb
stable/main/binary-m68k/mysql-client_3.23.49-8.8_m68k.deb
stable/main/binary-m68k/mysql-server_3.23.49-8.8_m68k.deb
stable/main/binary-m68k/libmysqlclient10_3.23.49-8.8_m68k.deb
mysql (3.23.49-8.8) stable-security; urgency=high
  * Maintainer upload by the Security Team
  * Applied patch to make mysqlhotcopy working again as it was broken by
    the upstream patch for the security problem fixed in 3.23.49-8.7
    [DSA 540 and CAN-2004-0457]
  * Applied patch to fix a minor privilege escalation possibility in the
    "ALTER TABLE ... RENAME" command.
    [http://bugs.mysql.com/3270, CAN-2004-0835]
  * Applied patch to fix a potential memory overrun in mysql_real_connect()
    (which required a compromised DNS server and certain operating systems).
    [http://bugs.mysql.com/4017, CAN-2004-0836]
  * Applied patch to fix a bug that could have resulted in a crash or
    hang of the server if concurrent accesses to MERGE tables (even one
    MERGE table and MyISAM tables) were used,
    [http://bugs.mysql.com/2408, CAN-2004-0837]


stable/main/binary-ia64/libmysqlclient10_3.23.49-8.8_ia64.deb
stable/main/binary-ia64/mysql-client_3.23.49-8.8_ia64.deb
stable/main/binary-ia64/libmysqlclient10-dev_3.23.49-8.8_ia64.deb
stable/main/binary-ia64/mysql-server_3.23.49-8.8_ia64.deb
mysql (3.23.49-8.8) stable-security; urgency=high
  * Maintainer upload by the Security Team
  * Applied patch to make mysqlhotcopy working again as it was broken by
    the upstream patch for the security problem fixed in 3.23.49-8.7
    [DSA 540 and CAN-2004-0457]
  * Applied patch to fix a minor privilege escalation possibility in the
    "ALTER TABLE ... RENAME" command.
    [http://bugs.mysql.com/3270, CAN-2004-0835]
  * Applied patch to fix a potential memory overrun in mysql_real_connect()
    (which required a compromised DNS server and certain operating systems).
    [http://bugs.mysql.com/4017, CAN-2004-0836]
  * Applied patch to fix a bug that could have resulted in a crash or
    hang of the server if concurrent accesses to MERGE tables (even one
    MERGE table and MyISAM tables) were used,
    [http://bugs.mysql.com/2408, CAN-2004-0837]


stable/main/binary-hppa/mysql-client_3.23.49-8.8_hppa.deb
stable/main/binary-hppa/libmysqlclient10_3.23.49-8.8_hppa.deb
stable/main/binary-hppa/mysql-server_3.23.49-8.8_hppa.deb
stable/main/binary-hppa/libmysqlclient10-dev_3.23.49-8.8_hppa.deb
mysql (3.23.49-8.8) stable-security; urgency=high
  * Maintainer upload by the Security Team
  * Applied patch to make mysqlhotcopy working again as it was broken by
    the upstream patch for the security problem fixed in 3.23.49-8.7
    [DSA 540 and CAN-2004-0457]
  * Applied patch to fix a minor privilege escalation possibility in the
    "ALTER TABLE ... RENAME" command.
    [http://bugs.mysql.com/3270, CAN-2004-0835]
  * Applied patch to fix a potential memory overrun in mysql_real_connect()
    (which required a compromised DNS server and certain operating systems).
    [http://bugs.mysql.com/4017, CAN-2004-0836]
  * Applied patch to fix a bug that could have resulted in a crash or
    hang of the server if concurrent accesses to MERGE tables (even one
    MERGE table and MyISAM tables) were used,
    [http://bugs.mysql.com/2408, CAN-2004-0837]


stable/main/binary-arm/mysql-server_3.23.49-8.8_arm.deb
stable/main/binary-arm/mysql-client_3.23.49-8.8_arm.deb
stable/main/binary-arm/libmysqlclient10_3.23.49-8.8_arm.deb
stable/main/binary-arm/libmysqlclient10-dev_3.23.49-8.8_arm.deb
mysql (3.23.49-8.8) stable-security; urgency=high
  * Maintainer upload by the Security Team
  * Applied patch to make mysqlhotcopy working again as it was broken by
    the upstream patch for the security problem fixed in 3.23.49-8.7
    [DSA 540 and CAN-2004-0457]
  * Applied patch to fix a minor privilege escalation possibility in the
    "ALTER TABLE ... RENAME" command.
    [http://bugs.mysql.com/3270, CAN-2004-0835]
  * Applied patch to fix a potential memory overrun in mysql_real_connect()
    (which required a compromised DNS server and certain operating systems).
    [http://bugs.mysql.com/4017, CAN-2004-0836]
  * Applied patch to fix a bug that could have resulted in a crash or
    hang of the server if concurrent accesses to MERGE tables (even one
    MERGE table and MyISAM tables) were used,
    [http://bugs.mysql.com/2408, CAN-2004-0837]


stable/main/binary-alpha/mysql-client_3.23.49-8.8_alpha.deb
stable/main/binary-alpha/mysql-server_3.23.49-8.8_alpha.deb
stable/main/binary-alpha/libmysqlclient10_3.23.49-8.8_alpha.deb
stable/main/binary-alpha/libmysqlclient10-dev_3.23.49-8.8_alpha.deb
mysql (3.23.49-8.8) stable-security; urgency=high
  * Maintainer upload by the Security Team
  * Applied patch to make mysqlhotcopy working again as it was broken by
    the upstream patch for the security problem fixed in 3.23.49-8.7
    [DSA 540 and CAN-2004-0457]
  * Applied patch to fix a minor privilege escalation possibility in the
    "ALTER TABLE ... RENAME" command.
    [http://bugs.mysql.com/3270, CAN-2004-0835]
  * Applied patch to fix a potential memory overrun in mysql_real_connect()
    (which required a compromised DNS server and certain operating systems).
    [http://bugs.mysql.com/4017, CAN-2004-0836]
  * Applied patch to fix a bug that could have resulted in a crash or
    hang of the server if concurrent accesses to MERGE tables (even one
    MERGE table and MyISAM tables) were used,
    [http://bugs.mysql.com/2408, CAN-2004-0837]


stable/main/source/mysql_3.23.49-8.8.diff.gz
stable/main/binary-i386/libmysqlclient10_3.23.49-8.8_i386.deb
stable/main/source/mysql_3.23.49-8.8.dsc
stable/main/binary-i386/mysql-server_3.23.49-8.8_i386.deb
stable/main/binary-i386/libmysqlclient10-dev_3.23.49-8.8_i386.deb
stable/main/binary-all/mysql-common_3.23.49-8.8_all.deb
stable/main/binary-i386/mysql-client_3.23.49-8.8_i386.deb
mysql (3.23.49-8.8) stable-security; urgency=high
  * Maintainer upload by the Security Team
  * Applied patch to make mysqlhotcopy working again as it was broken by
    the upstream patch for the security problem fixed in 3.23.49-8.7
    [DSA 540 and CAN-2004-0457]
  * Applied patch to fix a minor privilege escalation possibility in the
    "ALTER TABLE ... RENAME" command.
    [http://bugs.mysql.com/3270, CAN-2004-0835]
  * Applied patch to fix a potential memory overrun in mysql_real_connect()
    (which required a compromised DNS server and certain operating systems).
    [http://bugs.mysql.com/4017, CAN-2004-0836]
  * Applied patch to fix a bug that could have resulted in a crash or
    hang of the server if concurrent accesses to MERGE tables (even one
    MERGE table and MyISAM tables) were used,
    [http://bugs.mysql.com/2408, CAN-2004-0837]


stable/main/binary-sparc/mpg321_0.2.10.2_sparc.deb
mpg321 (0.2.10.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities (CAN-2003-0969)
    [mpg321.c]


stable/main/binary-s390/mpg321_0.2.10.2_s390.deb
mpg321 (0.2.10.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities (CAN-2003-0969)
    [mpg321.c]


stable/main/binary-powerpc/mpg321_0.2.10.2_powerpc.deb
mpg321 (0.2.10.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities (CAN-2003-0969)
    [mpg321.c]


stable/main/binary-mipsel/mpg321_0.2.10.2_mipsel.deb
mpg321 (0.2.10.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities (CAN-2003-0969)
    [mpg321.c]


stable/main/binary-mips/mpg321_0.2.10.2_mips.deb
mpg321 (0.2.10.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities (CAN-2003-0969)
    [mpg321.c]


stable/main/binary-m68k/mpg321_0.2.10.2_m68k.deb
mpg321 (0.2.10.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities (CAN-2003-0969)
    [mpg321.c]


stable/main/binary-ia64/mpg321_0.2.10.2_ia64.deb
mpg321 (0.2.10.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities (CAN-2003-0969)
    [mpg321.c]


stable/main/binary-hppa/mpg321_0.2.10.2_hppa.deb
mpg321 (0.2.10.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities (CAN-2003-0969)
    [mpg321.c]


stable/main/binary-arm/mpg321_0.2.10.2_arm.deb
mpg321 (0.2.10.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities (CAN-2003-0969)
    [mpg321.c]


stable/main/binary-alpha/mpg321_0.2.10.2_alpha.deb
mpg321 (0.2.10.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities (CAN-2003-0969)
    [mpg321.c]


stable/main/source/mpg321_0.2.10.2.dsc
stable/main/source/mpg321_0.2.10.2.tar.gz
stable/main/binary-i386/mpg321_0.2.10.2_i386.deb
mpg321 (0.2.10.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerabilities (CAN-2003-0969)
    [mpg321.c]


stable/non-free/binary-powerpc/mpg123_0.59r-13woody3_powerpc.deb
stable/non-free/binary-alpha/mpg123-esd_0.59r-13woody3_alpha.deb
stable/non-free/binary-i386/mpg123-esd_0.59r-13woody3_i386.deb
stable/non-free/binary-sparc/mpg123_0.59r-13woody3_sparc.deb
stable/non-free/source/mpg123_0.59r-13woody3.diff.gz
stable/non-free/binary-i386/mpg123-oss-3dnow_0.59r-13woody3_i386.deb
stable/non-free/source/mpg123_0.59r-13woody3.dsc
stable/non-free/binary-i386/mpg123_0.59r-13woody3_i386.deb
stable/non-free/binary-i386/mpg123-nas_0.59r-13woody3_i386.deb
stable/non-free/binary-arm/mpg123_0.59r-13woody3_arm.deb
stable/non-free/binary-m68k/mpg123_0.59r-13woody3_m68k.deb
stable/non-free/binary-hppa/mpg123_0.59r-13woody3_hppa.deb
stable/non-free/binary-alpha/mpg123_0.59r-13woody3_alpha.deb
stable/non-free/binary-powerpc/mpg123-esd_0.59r-13woody3_powerpc.deb
stable/non-free/binary-i386/mpg123-oss-i486_0.59r-13woody3_i386.deb
mpg123 (0.59r-13woody3) stable-security; urgency=high
  * layer2.c: Fix buffer overflow in layer2 decoder (CVE ID CAN-2004-0805).


stable/main/binary-sparc/libapache-mod-auth-shadow_1.3-3.1woody.1_sparc.deb
mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high
  * Add missing password and account expiration checks to validate.c
    (CAN-2004-0041)


stable/main/binary-s390/libapache-mod-auth-shadow_1.3-3.1woody.1_s390.deb
mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high
  * Add missing password and account expiration checks to validate.c
    (CAN-2004-0041)


stable/main/binary-powerpc/libapache-mod-auth-shadow_1.3-3.1woody.1_powerpc.deb
mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high
  * Add missing password and account expiration checks to validate.c
    (CAN-2004-0041)


stable/main/binary-mipsel/libapache-mod-auth-shadow_1.3-3.1woody.1_mipsel.deb
mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high
  * Add missing password and account expiration checks to validate.c
    (CAN-2004-0041)


stable/main/binary-mips/libapache-mod-auth-shadow_1.3-3.1woody.1_mips.deb
mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high
  * Add missing password and account expiration checks to validate.c
    (CAN-2004-0041)


stable/main/binary-m68k/libapache-mod-auth-shadow_1.3-3.1woody.1_m68k.deb
mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high
  * Add missing password and account expiration checks to validate.c
    (CAN-2004-0041)


stable/main/binary-ia64/libapache-mod-auth-shadow_1.3-3.1woody.1_ia64.deb
mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high
  * Add missing password and account expiration checks to validate.c
    (CAN-2004-0041)


stable/main/binary-hppa/libapache-mod-auth-shadow_1.3-3.1woody.1_hppa.deb
mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high
  * Add missing password and account expiration checks to validate.c
    (CAN-2004-0041)


stable/main/binary-arm/libapache-mod-auth-shadow_1.3-3.1woody.1_arm.deb
mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high
  * Add missing password and account expiration checks to validate.c
    (CAN-2004-0041)


stable/main/binary-alpha/libapache-mod-auth-shadow_1.3-3.1woody.1_alpha.deb
mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high
  * Add missing password and account expiration checks to validate.c
    (CAN-2004-0041)


stable/main/source/mod-auth-shadow_1.3-3.1woody.1.dsc
stable/main/source/mod-auth-shadow_1.3-3.1woody.1.diff.gz
stable/main/binary-i386/libapache-mod-auth-shadow_1.3-3.1woody.1_i386.deb
mod-auth-shadow (1.3-3.1woody.1) stable-security; urgency=high
  * Add missing password and account expiration checks to validate.c
    (CAN-2004-0041)


stable/main/binary-sparc/libmm11-dev_1.1.3-6.2_sparc.deb
stable/main/binary-sparc/libmm11_1.1.3-6.2_sparc.deb
mm (1.1.3-6.2) stable; urgency=low
  * Force the use of MMFILE shared memory.  This should fix segfault problems
    with PHP4 on some architectures (closes: #136261).


stable/main/binary-s390/libmm11-dev_1.1.3-6.2_s390.deb
stable/main/binary-s390/libmm11_1.1.3-6.2_s390.deb
mm (1.1.3-6.2) stable; urgency=low
  * Force the use of MMFILE shared memory.  This should fix segfault problems
    with PHP4 on some architectures (closes: #136261).


stable/main/binary-powerpc/libmm11-dev_1.1.3-6.2_powerpc.deb
stable/main/binary-powerpc/libmm11_1.1.3-6.2_powerpc.deb
mm (1.1.3-6.2) stable; urgency=low
  * Force the use of MMFILE shared memory.  This should fix segfault problems
    with PHP4 on some architectures (closes: #136261).


stable/main/binary-mipsel/libmm11-dev_1.1.3-6.2_mipsel.deb
stable/main/binary-mipsel/libmm11_1.1.3-6.2_mipsel.deb
mm (1.1.3-6.2) stable; urgency=low
  * Force the use of MMFILE shared memory.  This should fix segfault problems
    with PHP4 on some architectures (closes: #136261).


stable/main/binary-mips/libmm11-dev_1.1.3-6.2_mips.deb
stable/main/binary-mips/libmm11_1.1.3-6.2_mips.deb
mm (1.1.3-6.2) stable; urgency=low
  * Force the use of MMFILE shared memory.  This should fix segfault problems
    with PHP4 on some architectures (closes: #136261).


stable/main/binary-m68k/libmm11_1.1.3-6.2_m68k.deb
stable/main/binary-m68k/libmm11-dev_1.1.3-6.2_m68k.deb
mm (1.1.3-6.2) stable; urgency=low
  * Force the use of MMFILE shared memory.  This should fix segfault problems
    with PHP4 on some architectures (closes: #136261).


stable/main/binary-ia64/libmm11-dev_1.1.3-6.2_ia64.deb
stable/main/binary-ia64/libmm11_1.1.3-6.2_ia64.deb
mm (1.1.3-6.2) stable; urgency=low
  * Force the use of MMFILE shared memory.  This should fix segfault problems
    with PHP4 on some architectures (closes: #136261).


stable/main/binary-hppa/libmm11-dev_1.1.3-6.2_hppa.deb
stable/main/binary-hppa/libmm11_1.1.3-6.2_hppa.deb
mm (1.1.3-6.2) stable; urgency=low
  * Force the use of MMFILE shared memory.  This should fix segfault problems
    with PHP4 on some architectures (closes: #136261).


stable/main/binary-arm/libmm11_1.1.3-6.2_arm.deb
stable/main/binary-arm/libmm11-dev_1.1.3-6.2_arm.deb
mm (1.1.3-6.2) stable; urgency=low
  * Force the use of MMFILE shared memory.  This should fix segfault problems
    with PHP4 on some architectures (closes: #136261).


stable/main/binary-alpha/libmm11_1.1.3-6.2_alpha.deb
stable/main/binary-alpha/libmm11-dev_1.1.3-6.2_alpha.deb
mm (1.1.3-6.2) stable; urgency=low
  * Force the use of MMFILE shared memory.  This should fix segfault problems
    with PHP4 on some architectures (closes: #136261).


stable/main/source/mm_1.1.3-6.2.diff.gz
stable/main/source/mm_1.1.3-6.2.dsc
stable/main/binary-i386/libmm11_1.1.3-6.2_i386.deb
stable/main/binary-i386/libmm11-dev_1.1.3-6.2_i386.deb
mm (1.1.3-6.2) stable; urgency=low
  * Force the use of MMFILE shared memory.  This should fix segfault problems
    with PHP4 on some architectures (closes: #136261).


stable/main/binary-sparc/metamail_2.7-45woody.3_sparc.deb
metamail (2.7-45woody.3) stable; urgency=medium
  * Non-maintainer upload by the Security Team
  * Adjust the patch since Christian 'Naddy' Weisgerber discovered an
    overzealous use of sizeof().
  * Only upload to proposed-updates since the problem doesn't seem to
    break too much


stable/main/binary-s390/metamail_2.7-45woody.3_s390.deb
metamail (2.7-45woody.3) stable; urgency=medium
  * Non-maintainer upload by the Security Team
  * Adjust the patch since Christian 'Naddy' Weisgerber discovered an
    overzealous use of sizeof().
  * Only upload to proposed-updates since the problem doesn't seem to
    break too much


stable/main/binary-powerpc/metamail_2.7-45woody.3_powerpc.deb
metamail (2.7-45woody.3) stable; urgency=medium
  * Non-maintainer upload by the Security Team
  * Adjust the patch since Christian 'Naddy' Weisgerber discovered an
    overzealous use of sizeof().
  * Only upload to proposed-updates since the problem doesn't seem to
    break too much


stable/main/binary-mipsel/metamail_2.7-45woody.3_mipsel.deb
metamail (2.7-45woody.3) stable; urgency=medium
  * Non-maintainer upload by the Security Team
  * Adjust the patch since Christian 'Naddy' Weisgerber discovered an
    overzealous use of sizeof().
  * Only upload to proposed-updates since the problem doesn't seem to
    break too much


stable/main/binary-mips/metamail_2.7-45woody.3_mips.deb
metamail (2.7-45woody.3) stable; urgency=medium
  * Non-maintainer upload by the Security Team
  * Adjust the patch since Christian 'Naddy' Weisgerber discovered an
    overzealous use of sizeof().
  * Only upload to proposed-updates since the problem doesn't seem to
    break too much


stable/main/binary-m68k/metamail_2.7-45woody.3_m68k.deb
metamail (2.7-45woody.3) stable; urgency=medium
  * Non-maintainer upload by the Security Team
  * Adjust the patch since Christian 'Naddy' Weisgerber discovered an
    overzealous use of sizeof().
  * Only upload to proposed-updates since the problem doesn't seem to
    break too much


stable/main/binary-ia64/metamail_2.7-45woody.3_ia64.deb
metamail (2.7-45woody.3) stable; urgency=medium
  * Non-maintainer upload by the Security Team
  * Adjust the patch since Christian 'Naddy' Weisgerber discovered an
    overzealous use of sizeof().
  * Only upload to proposed-updates since the problem doesn't seem to
    break too much


stable/main/binary-hppa/metamail_2.7-45woody.3_hppa.deb
metamail (2.7-45woody.3) stable; urgency=medium
  * Non-maintainer upload by the Security Team
  * Adjust the patch since Christian 'Naddy' Weisgerber discovered an
    overzealous use of sizeof().
  * Only upload to proposed-updates since the problem doesn't seem to
    break too much


stable/main/binary-arm/metamail_2.7-45woody.3_arm.deb
metamail (2.7-45woody.3) stable; urgency=medium
  * Non-maintainer upload by the Security Team
  * Adjust the patch since Christian 'Naddy' Weisgerber discovered an
    overzealous use of sizeof().
  * Only upload to proposed-updates since the problem doesn't seem to
    break too much


stable/main/binary-alpha/metamail_2.7-45woody.3_alpha.deb
metamail (2.7-45woody.3) stable; urgency=medium
  * Non-maintainer upload by the Security Team
  * Adjust the patch since Christian 'Naddy' Weisgerber discovered an
    overzealous use of sizeof().
  * Only upload to proposed-updates since the problem doesn't seem to
    break too much


stable/main/source/metamail_2.7-45woody.3.dsc
stable/main/binary-i386/metamail_2.7-45woody.3_i386.deb
stable/main/source/metamail_2.7-45woody.3.diff.gz
metamail (2.7-45woody.3) stable; urgency=medium
  * Non-maintainer upload by the Security Team
  * Adjust the patch since Christian 'Naddy' Weisgerber discovered an
    overzealous use of sizeof().
  * Only upload to proposed-updates since the problem doesn't seem to
    break too much


stable/main/binary-sparc/mc_4.5.55-1.2woody3_sparc.deb
stable/main/binary-sparc/gmc_4.5.55-1.2woody3_sparc.deb
stable/main/binary-sparc/mc-common_4.5.55-1.2woody3_sparc.deb
mc (4.5.55-1.2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied (and backported) corrections by Jakub Jelinek to fix buffer
    overflows (CAN-2004-0226), a format string vulnerability
    (CAN-2004-0232) and some insecure temporary file creations
    (CAN-2004-0231) [52_security_CAN-2004-0226.diff]


stable/main/binary-s390/mc_4.5.55-1.2woody3_s390.deb
stable/main/binary-s390/gmc_4.5.55-1.2woody3_s390.deb
stable/main/binary-s390/mc-common_4.5.55-1.2woody3_s390.deb
mc (4.5.55-1.2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied (and backported) corrections by Jakub Jelinek to fix buffer
    overflows (CAN-2004-0226), a format string vulnerability
    (CAN-2004-0232) and some insecure temporary file creations
    (CAN-2004-0231) [52_security_CAN-2004-0226.diff]


stable/main/binary-powerpc/mc_4.5.55-1.2woody3_powerpc.deb
stable/main/binary-powerpc/gmc_4.5.55-1.2woody3_powerpc.deb
stable/main/binary-powerpc/mc-common_4.5.55-1.2woody3_powerpc.deb
mc (4.5.55-1.2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied (and backported) corrections by Jakub Jelinek to fix buffer
    overflows (CAN-2004-0226), a format string vulnerability
    (CAN-2004-0232) and some insecure temporary file creations
    (CAN-2004-0231) [52_security_CAN-2004-0226.diff]


stable/main/binary-mipsel/gmc_4.5.55-1.2woody3_mipsel.deb
stable/main/binary-mipsel/mc_4.5.55-1.2woody3_mipsel.deb
stable/main/binary-mipsel/mc-common_4.5.55-1.2woody3_mipsel.deb
mc (4.5.55-1.2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied (and backported) corrections by Jakub Jelinek to fix buffer
    overflows (CAN-2004-0226), a format string vulnerability
    (CAN-2004-0232) and some insecure temporary file creations
    (CAN-2004-0231) [52_security_CAN-2004-0226.diff]


stable/main/binary-mips/gmc_4.5.55-1.2woody3_mips.deb
stable/main/binary-mips/mc-common_4.5.55-1.2woody3_mips.deb
stable/main/binary-mips/mc_4.5.55-1.2woody3_mips.deb
mc (4.5.55-1.2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied (and backported) corrections by Jakub Jelinek to fix buffer
    overflows (CAN-2004-0226), a format string vulnerability
    (CAN-2004-0232) and some insecure temporary file creations
    (CAN-2004-0231) [52_security_CAN-2004-0226.diff]


stable/main/binary-m68k/mc_4.5.55-1.2woody3_m68k.deb
stable/main/binary-m68k/mc-common_4.5.55-1.2woody3_m68k.deb
stable/main/binary-m68k/gmc_4.5.55-1.2woody3_m68k.deb
mc (4.5.55-1.2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied (and backported) corrections by Jakub Jelinek to fix buffer
    overflows (CAN-2004-0226), a format string vulnerability
    (CAN-2004-0232) and some insecure temporary file creations
    (CAN-2004-0231) [52_security_CAN-2004-0226.diff]


stable/main/binary-ia64/gmc_4.5.55-1.2woody3_ia64.deb
stable/main/binary-ia64/mc_4.5.55-1.2woody3_ia64.deb
stable/main/binary-ia64/mc-common_4.5.55-1.2woody3_ia64.deb
mc (4.5.55-1.2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied (and backported) corrections by Jakub Jelinek to fix buffer
    overflows (CAN-2004-0226), a format string vulnerability
    (CAN-2004-0232) and some insecure temporary file creations
    (CAN-2004-0231) [52_security_CAN-2004-0226.diff]


stable/main/binary-hppa/mc-common_4.5.55-1.2woody3_hppa.deb
stable/main/binary-hppa/gmc_4.5.55-1.2woody3_hppa.deb
stable/main/binary-hppa/mc_4.5.55-1.2woody3_hppa.deb
mc (4.5.55-1.2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied (and backported) corrections by Jakub Jelinek to fix buffer
    overflows (CAN-2004-0226), a format string vulnerability
    (CAN-2004-0232) and some insecure temporary file creations
    (CAN-2004-0231) [52_security_CAN-2004-0226.diff]


stable/main/binary-arm/mc-common_4.5.55-1.2woody3_arm.deb
stable/main/binary-arm/gmc_4.5.55-1.2woody3_arm.deb
stable/main/binary-arm/mc_4.5.55-1.2woody3_arm.deb
mc (4.5.55-1.2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied (and backported) corrections by Jakub Jelinek to fix buffer
    overflows (CAN-2004-0226), a format string vulnerability
    (CAN-2004-0232) and some insecure temporary file creations
    (CAN-2004-0231) [52_security_CAN-2004-0226.diff]


stable/main/binary-alpha/mc-common_4.5.55-1.2woody3_alpha.deb
stable/main/binary-alpha/gmc_4.5.55-1.2woody3_alpha.deb
stable/main/binary-alpha/mc_4.5.55-1.2woody3_alpha.deb
mc (4.5.55-1.2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied (and backported) corrections by Jakub Jelinek to fix buffer
    overflows (CAN-2004-0226), a format string vulnerability
    (CAN-2004-0232) and some insecure temporary file creations
    (CAN-2004-0231) [52_security_CAN-2004-0226.diff]


stable/main/binary-i386/mc_4.5.55-1.2woody3_i386.deb
stable/main/binary-i386/mc-common_4.5.55-1.2woody3_i386.deb
stable/main/binary-i386/gmc_4.5.55-1.2woody3_i386.deb
stable/main/source/mc_4.5.55-1.2woody3.dsc
stable/main/source/mc_4.5.55-1.2woody3.diff.gz
mc (4.5.55-1.2woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied (and backported) corrections by Jakub Jelinek to fix buffer
    overflows (CAN-2004-0226), a format string vulnerability
    (CAN-2004-0232) and some insecure temporary file creations
    (CAN-2004-0231) [52_security_CAN-2004-0226.diff]


stable/main/source/mailreader_2.3.29-5woody1.dsc
stable/main/binary-all/mailreader_2.3.29-5woody1_all.deb
stable/main/source/mailreader_2.3.29-5woody1.diff.gz
mailreader (2.3.29-5woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from Maurizio Lemmo - Tannoiser to fix CAN-2002-1581:
    Directory traversal vulnerability in nph-mr.cgi allows remote attackers to
    view arbitrary files via .. (dot dot) sequences and a null byte (%00) in
    the configLanguage parameter


stable/main/binary-sparc/mailman_2.0.11-1woody8_sparc.deb
mailman (2.0.11-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages
    with no Subject header at all (Closes: #232079)


stable/main/binary-s390/mailman_2.0.11-1woody8_s390.deb
mailman (2.0.11-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages
    with no Subject header at all (Closes: #232079)


stable/main/binary-powerpc/mailman_2.0.11-1woody8_powerpc.deb
mailman (2.0.11-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages
    with no Subject header at all (Closes: #232079)


stable/main/binary-mipsel/mailman_2.0.11-1woody8_mipsel.deb
mailman (2.0.11-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages
    with no Subject header at all (Closes: #232079)


stable/main/binary-mips/mailman_2.0.11-1woody8_mips.deb
mailman (2.0.11-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages
    with no Subject header at all (Closes: #232079)


stable/main/binary-m68k/mailman_2.0.11-1woody8_m68k.deb
mailman (2.0.11-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages
    with no Subject header at all (Closes: #232079)


stable/main/binary-ia64/mailman_2.0.11-1woody8_ia64.deb
mailman (2.0.11-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages
    with no Subject header at all (Closes: #232079)


stable/main/binary-hppa/mailman_2.0.11-1woody8_hppa.deb
mailman (2.0.11-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages
    with no Subject header at all (Closes: #232079)


stable/main/binary-arm/mailman_2.0.11-1woody8_arm.deb
mailman (2.0.11-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages
    with no Subject header at all (Closes: #232079)


stable/main/binary-alpha/mailman_2.0.11-1woody8_alpha.deb
mailman (2.0.11-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages
    with no Subject header at all (Closes: #232079)


stable/main/source/mailman_2.0.11-1woody8.dsc
stable/main/binary-i386/mailman_2.0.11-1woody8_i386.deb
stable/main/source/mailman_2.0.11-1woody8.diff.gz
mailman (2.0.11-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a bug introduced in 2.0.11-1woody7 which caused a crash on messages
    with no Subject header at all (Closes: #232079)


stable/main/binary-sparc/mah-jong_1.4-3_sparc.deb
mah-jong (1.4-3) stable-security; urgency=high
  * Fix a denial of service: the server used to segfault when a client
    connected with an empty name. (Fix backported from version 1.6.1.)
    [controller.c, CAN-2004-0458]


stable/main/binary-s390/mah-jong_1.4-3_s390.deb
mah-jong (1.4-3) stable-security; urgency=high
  * Fix a denial of service: the server used to segfault when a client
    connected with an empty name. (Fix backported from version 1.6.1.)
    [controller.c, CAN-2004-0458]


stable/main/binary-powerpc/mah-jong_1.4-3_powerpc.deb
mah-jong (1.4-3) stable-security; urgency=high
  * Fix a denial of service: the server used to segfault when a client
    connected with an empty name. (Fix backported from version 1.6.1.)
    [controller.c, CAN-2004-0458]


stable/main/binary-mipsel/mah-jong_1.4-3_mipsel.deb
mah-jong (1.4-3) stable-security; urgency=high
  * Fix a denial of service: the server used to segfault when a client
    connected with an empty name. (Fix backported from version 1.6.1.)
    [controller.c, CAN-2004-0458]


stable/main/binary-mips/mah-jong_1.4-3_mips.deb
mah-jong (1.4-3) stable-security; urgency=high
  * Fix a denial of service: the server used to segfault when a client
    connected with an empty name. (Fix backported from version 1.6.1.)
    [controller.c, CAN-2004-0458]


stable/main/binary-m68k/mah-jong_1.4-3_m68k.deb
mah-jong (1.4-3) stable-security; urgency=high
  * Fix a denial of service: the server used to segfault when a client
    connected with an empty name. (Fix backported from version 1.6.1.)
    [controller.c, CAN-2004-0458]


stable/main/binary-ia64/mah-jong_1.4-3_ia64.deb
mah-jong (1.4-3) stable-security; urgency=high
  * Fix a denial of service: the server used to segfault when a client
    connected with an empty name. (Fix backported from version 1.6.1.)
    [controller.c, CAN-2004-0458]


stable/main/binary-hppa/mah-jong_1.4-3_hppa.deb
mah-jong (1.4-3) stable-security; urgency=high
  * Fix a denial of service: the server used to segfault when a client
    connected with an empty name. (Fix backported from version 1.6.1.)
    [controller.c, CAN-2004-0458]


stable/main/binary-arm/mah-jong_1.4-3_arm.deb
mah-jong (1.4-3) stable-security; urgency=high
  * Fix a denial of service: the server used to segfault when a client
    connected with an empty name. (Fix backported from version 1.6.1.)
    [controller.c, CAN-2004-0458]


stable/main/binary-alpha/mah-jong_1.4-3_alpha.deb
mah-jong (1.4-3) stable-security; urgency=high
  * Fix a denial of service: the server used to segfault when a client
    connected with an empty name. (Fix backported from version 1.6.1.)
    [controller.c, CAN-2004-0458]


stable/main/source/mah-jong_1.4-3.dsc
stable/main/source/mah-jong_1.4-3.diff.gz
stable/main/binary-i386/mah-jong_1.4-3_i386.deb
mah-jong (1.4-3) stable-security; urgency=high
  * Fix a denial of service: the server used to segfault when a client
    connected with an empty name. (Fix backported from version 1.6.1.)
    [controller.c, CAN-2004-0458]


stable/main/binary-sparc/lynx_2.8.4.1b-3.2_sparc.deb
lynx (2.8.4.1b-3.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Really apply the patch instead of only documenting it. doh.


stable/main/binary-s390/lynx_2.8.4.1b-3.2_s390.deb
lynx (2.8.4.1b-3.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Really apply the patch instead of only documenting it. doh.


stable/main/binary-powerpc/lynx_2.8.4.1b-3.2_powerpc.deb
lynx (2.8.4.1b-3.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Really apply the patch instead of only documenting it. doh.


stable/main/binary-mipsel/lynx_2.8.4.1b-3.2_mipsel.deb
lynx (2.8.4.1b-3.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Really apply the patch instead of only documenting it. doh.


stable/main/binary-mips/lynx_2.8.4.1b-3.2_mips.deb
lynx (2.8.4.1b-3.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Really apply the patch instead of only documenting it. doh.


stable/main/binary-m68k/lynx_2.8.4.1b-3.2_m68k.deb
lynx (2.8.4.1b-3.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Really apply the patch instead of only documenting it. doh.


stable/main/binary-ia64/lynx_2.8.4.1b-3.2_ia64.deb
lynx (2.8.4.1b-3.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Really apply the patch instead of only documenting it. doh.


stable/main/binary-hppa/lynx_2.8.4.1b-3.2_hppa.deb
lynx (2.8.4.1b-3.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Really apply the patch instead of only documenting it. doh.


stable/main/binary-arm/lynx_2.8.4.1b-3.2_arm.deb
lynx (2.8.4.1b-3.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Really apply the patch instead of only documenting it. doh.


stable/main/binary-alpha/lynx_2.8.4.1b-3.2_alpha.deb
lynx (2.8.4.1b-3.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Really apply the patch instead of only documenting it. doh.


stable/main/source/lynx_2.8.4.1b-3.2.diff.gz
stable/main/binary-i386/lynx_2.8.4.1b-3.2_i386.deb
stable/main/source/lynx_2.8.4.1b-3.2.dsc
lynx (2.8.4.1b-3.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Really apply the patch instead of only documenting it. doh.
lynx (2.8.4.1b-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge patch from SCO advisory CSSA-2002-049.0 (but without the bits
    that create backup files). This fixes handling of CRLF in external
    URLs.


stable/main/binary-sparc/lxr_0.3-3_sparc.deb
lxr (0.3-3) stable-security; urgency=high
  * Applied an upstream patch to not allow remote users to read all files


stable/main/binary-s390/lxr_0.3-3_s390.deb
lxr (0.3-3) stable-security; urgency=high
  * Applied an upstream patch to not allow remote users to read all files


stable/main/binary-powerpc/lxr_0.3-3_powerpc.deb
lxr (0.3-3) stable-security; urgency=high
  * Applied an upstream patch to not allow remote users to read all files


stable/main/binary-mipsel/lxr_0.3-3_mipsel.deb
lxr (0.3-3) stable-security; urgency=high
  * Applied an upstream patch to not allow remote users to read all files


stable/main/binary-mips/lxr_0.3-3_mips.deb
lxr (0.3-3) stable-security; urgency=high
  * Applied an upstream patch to not allow remote users to read all files


stable/main/binary-m68k/lxr_0.3-3_m68k.deb
lxr (0.3-3) stable-security; urgency=high
  * Applied an upstream patch to not allow remote users to read all files


stable/main/binary-ia64/lxr_0.3-3_ia64.deb
lxr (0.3-3) stable-security; urgency=high
  * Applied an upstream patch to not allow remote users to read all files


stable/main/binary-i386/lxr_0.3-3_i386.deb
lxr (0.3-3) stable-security; urgency=high
  * Applied an upstream patch to not allow remote users to read all files


stable/main/binary-hppa/lxr_0.3-3_hppa.deb
lxr (0.3-3) stable-security; urgency=high
  * Applied an upstream patch to not allow remote users to read all files


stable/main/binary-alpha/lxr_0.3-3_alpha.deb
lxr (0.3-3) stable-security; urgency=high
  * Applied an upstream patch to not allow remote users to read all files


stable/main/source/lxr_0.3-3.diff.gz
stable/main/source/lxr_0.3-3.dsc
stable/main/binary-arm/lxr_0.3-3_arm.deb
lxr (0.3-3) stable-security; urgency=high
  * Applied an upstream patch to not allow remote users to read all files


stable/main/binary-sparc/lvm10_1.0.4-5woody1_sparc.deb
lvm10 (1:1.0.4-5woody1) stable; urgency=medium
  * Fix bug in vgimport that could prevent volume groups with out-of-sequence
    PV numbers from being imported. Since PV can get out-of-sequence quite
    easily this can potentially make vgexport a disasterous operation.


stable/main/binary-s390/lvm10_1.0.4-5woody1_s390.deb
lvm10 (1:1.0.4-5woody1) stable; urgency=medium
  * Fix bug in vgimport that could prevent volume groups with out-of-sequence
    PV numbers from being imported. Since PV can get out-of-sequence quite
    easily this can potentially make vgexport a disasterous operation.


stable/main/binary-powerpc/lvm10_1.0.4-5woody1_powerpc.deb
lvm10 (1:1.0.4-5woody1) stable; urgency=medium
  * Fix bug in vgimport that could prevent volume groups with out-of-sequence
    PV numbers from being imported. Since PV can get out-of-sequence quite
    easily this can potentially make vgexport a disasterous operation.


stable/main/binary-mipsel/lvm10_1.0.4-5woody1_mipsel.deb
lvm10 (1:1.0.4-5woody1) stable; urgency=medium
  * Fix bug in vgimport that could prevent volume groups with out-of-sequence
    PV numbers from being imported. Since PV can get out-of-sequence quite
    easily this can potentially make vgexport a disasterous operation.


stable/main/binary-mips/lvm10_1.0.4-5woody1_mips.deb
lvm10 (1:1.0.4-5woody1) stable; urgency=medium
  * Fix bug in vgimport that could prevent volume groups with out-of-sequence
    PV numbers from being imported. Since PV can get out-of-sequence quite
    easily this can potentially make vgexport a disasterous operation.


stable/main/binary-m68k/lvm10_1.0.4-5woody1_m68k.deb
lvm10 (1:1.0.4-5woody1) stable; urgency=medium
  * Fix bug in vgimport that could prevent volume groups with out-of-sequence
    PV numbers from being imported. Since PV can get out-of-sequence quite
    easily this can potentially make vgexport a disasterous operation.


stable/main/binary-ia64/lvm10_1.0.4-5woody1_ia64.deb
lvm10 (1:1.0.4-5woody1) stable; urgency=medium
  * Fix bug in vgimport that could prevent volume groups with out-of-sequence
    PV numbers from being imported. Since PV can get out-of-sequence quite
    easily this can potentially make vgexport a disasterous operation.


stable/main/binary-hppa/lvm10_1.0.4-5woody1_hppa.deb
lvm10 (1:1.0.4-5woody1) stable; urgency=medium
  * Fix bug in vgimport that could prevent volume groups with out-of-sequence
    PV numbers from being imported. Since PV can get out-of-sequence quite
    easily this can potentially make vgexport a disasterous operation.


stable/main/binary-arm/lvm10_1.0.4-5woody1_arm.deb
lvm10 (1:1.0.4-5woody1) stable; urgency=medium
  * Fix bug in vgimport that could prevent volume groups with out-of-sequence
    PV numbers from being imported. Since PV can get out-of-sequence quite
    easily this can potentially make vgexport a disasterous operation.


stable/main/binary-alpha/lvm10_1.0.4-5woody1_alpha.deb
lvm10 (1:1.0.4-5woody1) stable; urgency=medium
  * Fix bug in vgimport that could prevent volume groups with out-of-sequence
    PV numbers from being imported. Since PV can get out-of-sequence quite
    easily this can potentially make vgexport a disasterous operation.


stable/main/binary-i386/lvm10_1.0.4-5woody1_i386.deb
stable/main/source/lvm10_1.0.4-5woody1.dsc
stable/main/source/lvm10_1.0.4-5woody1.diff.gz
lvm10 (1:1.0.4-5woody1) stable; urgency=medium
  * Fix bug in vgimport that could prevent volume groups with out-of-sequence
    PV numbers from being imported. Since PV can get out-of-sequence quite
    easily this can potentially make vgexport a disasterous operation.


stable/main/binary-sparc/lukemftpd_1.1-1woody2_sparc.deb
lukemftpd (1.1-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix broken OOB handling which could be used
    to execute arbitrary code [src/ftpd.c, CAN-2004-0794]


stable/main/binary-s390/lukemftpd_1.1-1woody2_s390.deb
lukemftpd (1.1-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix broken OOB handling which could be used
    to execute arbitrary code [src/ftpd.c, CAN-2004-0794]


stable/main/binary-powerpc/lukemftpd_1.1-1woody2_powerpc.deb
lukemftpd (1.1-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix broken OOB handling which could be used
    to execute arbitrary code [src/ftpd.c, CAN-2004-0794]


stable/main/binary-mipsel/lukemftpd_1.1-1woody2_mipsel.deb
lukemftpd (1.1-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix broken OOB handling which could be used
    to execute arbitrary code [src/ftpd.c, CAN-2004-0794]


stable/main/binary-mips/lukemftpd_1.1-1woody2_mips.deb
lukemftpd (1.1-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix broken OOB handling which could be used
    to execute arbitrary code [src/ftpd.c, CAN-2004-0794]


stable/main/binary-m68k/lukemftpd_1.1-1woody2_m68k.deb
lukemftpd (1.1-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix broken OOB handling which could be used
    to execute arbitrary code [src/ftpd.c, CAN-2004-0794]


stable/main/binary-ia64/lukemftpd_1.1-1woody2_ia64.deb
lukemftpd (1.1-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix broken OOB handling which could be used
    to execute arbitrary code [src/ftpd.c, CAN-2004-0794]


stable/main/binary-i386/lukemftpd_1.1-1woody2_i386.deb
lukemftpd (1.1-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix broken OOB handling which could be used
    to execute arbitrary code [src/ftpd.c, CAN-2004-0794]


stable/main/binary-arm/lukemftpd_1.1-1woody2_arm.deb
lukemftpd (1.1-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix broken OOB handling which could be used
    to execute arbitrary code [src/ftpd.c, CAN-2004-0794]


stable/main/binary-alpha/lukemftpd_1.1-1woody2_alpha.deb
lukemftpd (1.1-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix broken OOB handling which could be used
    to execute arbitrary code [src/ftpd.c, CAN-2004-0794]


stable/main/source/lukemftpd_1.1-1woody2.diff.gz
stable/main/binary-hppa/lukemftpd_1.1-1woody2_hppa.deb
stable/main/source/lukemftpd_1.1-1woody2.dsc
lukemftpd (1.1-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix broken OOB handling which could be used
    to execute arbitrary code [src/ftpd.c, CAN-2004-0794]


stable/main/binary-sparc/lpr-ppd_0.72-2.1_sparc.deb
lpr-ppd (1:0.72-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file
    access (CAN-2003-0144)


stable/main/binary-s390/lpr-ppd_0.72-2.1_s390.deb
lpr-ppd (1:0.72-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file
    access (CAN-2003-0144)


stable/main/binary-powerpc/lpr-ppd_0.72-2.1_powerpc.deb
lpr-ppd (1:0.72-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file
    access (CAN-2003-0144)


stable/main/binary-mipsel/lpr-ppd_0.72-2.1_mipsel.deb
lpr-ppd (1:0.72-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file
    access (CAN-2003-0144)


stable/main/binary-mips/lpr-ppd_0.72-2.1_mips.deb
lpr-ppd (1:0.72-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file
    access (CAN-2003-0144)


stable/main/binary-ia64/lpr-ppd_0.72-2.1_ia64.deb
lpr-ppd (1:0.72-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file
    access (CAN-2003-0144)


stable/main/binary-i386/lpr-ppd_0.72-2.1_i386.deb
lpr-ppd (1:0.72-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file
    access (CAN-2003-0144)


stable/main/binary-hppa/lpr-ppd_0.72-2.1_hppa.deb
lpr-ppd (1:0.72-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file
    access (CAN-2003-0144)


stable/main/binary-arm/lpr-ppd_0.72-2.1_arm.deb
lpr-ppd (1:0.72-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file
    access (CAN-2003-0144)


stable/main/binary-alpha/lpr-ppd_0.72-2.1_alpha.deb
lpr-ppd (1:0.72-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file
    access (CAN-2003-0144)


stable/main/source/lpr-ppd_0.72-2.1.dsc
stable/main/binary-m68k/lpr-ppd_0.72-2.1_m68k.deb
stable/main/source/lpr-ppd_0.72-2.1.diff.gz
lpr-ppd (1:0.72-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file
    access (CAN-2003-0144)


stable/main/binary-s390/lpr_2000.05.07-4.3_s390.deb
lpr (1:2000.05.07-4.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file access


stable/main/binary-powerpc/lpr_2000.05.07-4.3_powerpc.deb
lpr (1:2000.05.07-4.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file access


stable/main/binary-mipsel/lpr_2000.05.07-4.3_mipsel.deb
lpr (1:2000.05.07-4.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file access


stable/main/binary-mips/lpr_2000.05.07-4.3_mips.deb
lpr (1:2000.05.07-4.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file access


stable/main/binary-m68k/lpr_2000.05.07-4.3_m68k.deb
lpr (1:2000.05.07-4.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file access


stable/main/binary-ia64/lpr_2000.05.07-4.3_ia64.deb
lpr (1:2000.05.07-4.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file access


stable/main/binary-i386/lpr_2000.05.07-4.3_i386.deb
lpr (1:2000.05.07-4.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file access


stable/main/binary-hppa/lpr_2000.05.07-4.3_hppa.deb
lpr (1:2000.05.07-4.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file access


stable/main/binary-arm/lpr_2000.05.07-4.3_arm.deb
lpr (1:2000.05.07-4.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file access


stable/main/binary-alpha/lpr_2000.05.07-4.3_alpha.deb
lpr (1:2000.05.07-4.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file access


stable/main/binary-sparc/lpr_2000.05.07-4.3_sparc.deb
stable/main/source/lpr_2000.05.07-4.3.diff.gz
stable/main/source/lpr_2000.05.07-4.3.dsc
lpr (1:2000.05.07-4.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from SuSE to fix buffer overvlow and arbitrary file access


stable/main/source/logcheck_1.1.1-13.1woody2.diff.gz
stable/main/binary-all/logcheck-database_1.1.1-13.1woody2_all.deb
stable/main/source/logcheck_1.1.1-13.1woody2.dsc
stable/main/binary-all/logtail_1.1.1-13.1woody2_all.deb
stable/main/binary-all/logcheck_1.1.1-13.1woody2_all.deb
logcheck (1.1.1-13.1woody2) stable; urgency=low
  * Important one-line fix for non-interactive debconf frontend which broke
    apt installs for other packages, too (closes: #244511)


stable/main/binary-sparc/log2mail_0.2.5.2_sparc.deb
log2mail (0.2.5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string bug in printlog() (CAN-2004-0450)


stable/main/binary-s390/log2mail_0.2.5.2_s390.deb
log2mail (0.2.5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string bug in printlog() (CAN-2004-0450)


stable/main/binary-powerpc/log2mail_0.2.5.2_powerpc.deb
log2mail (0.2.5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string bug in printlog() (CAN-2004-0450)


stable/main/binary-mipsel/log2mail_0.2.5.2_mipsel.deb
log2mail (0.2.5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string bug in printlog() (CAN-2004-0450)


stable/main/binary-mips/log2mail_0.2.5.2_mips.deb
log2mail (0.2.5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string bug in printlog() (CAN-2004-0450)


stable/main/binary-m68k/log2mail_0.2.5.2_m68k.deb
log2mail (0.2.5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string bug in printlog() (CAN-2004-0450)


stable/main/binary-ia64/log2mail_0.2.5.2_ia64.deb
log2mail (0.2.5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string bug in printlog() (CAN-2004-0450)


stable/main/binary-hppa/log2mail_0.2.5.2_hppa.deb
log2mail (0.2.5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string bug in printlog() (CAN-2004-0450)


stable/main/binary-arm/log2mail_0.2.5.2_arm.deb
log2mail (0.2.5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string bug in printlog() (CAN-2004-0450)


stable/main/binary-alpha/log2mail_0.2.5.2_alpha.deb
log2mail (0.2.5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string bug in printlog() (CAN-2004-0450)


stable/main/source/log2mail_0.2.5.2.dsc
stable/main/source/log2mail_0.2.5.2.tar.gz
stable/main/binary-i386/log2mail_0.2.5.2_i386.deb
log2mail (0.2.5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string bug in printlog() (CAN-2004-0450)


stable/main/binary-sparc/libxslt1_1.0.16-0.2_sparc.deb
stable/main/binary-sparc/libxslt1-dev_1.0.16-0.2_sparc.deb
stable/main/binary-sparc/xsltproc_1.0.16-0.2_sparc.deb
libxslt (1.0.16-0.2) stable; urgency=low
  * Include xsltInternals.h in transform.h, or else compilation might fail.
    Thanks to Marcel Meckel for reporting this.


stable/main/binary-s390/libxslt1_1.0.16-0.2_s390.deb
stable/main/binary-s390/libxslt1-dev_1.0.16-0.2_s390.deb
stable/main/binary-s390/xsltproc_1.0.16-0.2_s390.deb
libxslt (1.0.16-0.2) stable; urgency=low
  * Include xsltInternals.h in transform.h, or else compilation might fail.
    Thanks to Marcel Meckel for reporting this.


stable/main/binary-powerpc/libxslt1_1.0.16-0.2_powerpc.deb
stable/main/binary-powerpc/libxslt1-dev_1.0.16-0.2_powerpc.deb
stable/main/binary-powerpc/xsltproc_1.0.16-0.2_powerpc.deb
libxslt (1.0.16-0.2) stable; urgency=low
  * Include xsltInternals.h in transform.h, or else compilation might fail.
    Thanks to Marcel Meckel for reporting this.


stable/main/binary-mipsel/libxslt1_1.0.16-0.2_mipsel.deb
stable/main/binary-mipsel/libxslt1-dev_1.0.16-0.2_mipsel.deb
stable/main/binary-mipsel/xsltproc_1.0.16-0.2_mipsel.deb
libxslt (1.0.16-0.2) stable; urgency=low
  * Include xsltInternals.h in transform.h, or else compilation might fail.
    Thanks to Marcel Meckel for reporting this.


stable/main/binary-mips/xsltproc_1.0.16-0.2_mips.deb
stable/main/binary-mips/libxslt1-dev_1.0.16-0.2_mips.deb
stable/main/binary-mips/libxslt1_1.0.16-0.2_mips.deb
libxslt (1.0.16-0.2) stable; urgency=low
  * Include xsltInternals.h in transform.h, or else compilation might fail.
    Thanks to Marcel Meckel for reporting this.


stable/main/binary-m68k/xsltproc_1.0.16-0.2_m68k.deb
stable/main/binary-m68k/libxslt1_1.0.16-0.2_m68k.deb
stable/main/binary-m68k/libxslt1-dev_1.0.16-0.2_m68k.deb
libxslt (1.0.16-0.2) stable; urgency=low
  * Include xsltInternals.h in transform.h, or else compilation might fail.
    Thanks to Marcel Meckel for reporting this.


stable/main/binary-ia64/xsltproc_1.0.16-0.2_ia64.deb
stable/main/binary-ia64/libxslt1-dev_1.0.16-0.2_ia64.deb
stable/main/binary-ia64/libxslt1_1.0.16-0.2_ia64.deb
libxslt (1.0.16-0.2) stable; urgency=low
  * Include xsltInternals.h in transform.h, or else compilation might fail.
    Thanks to Marcel Meckel for reporting this.


stable/main/binary-hppa/libxslt1-dev_1.0.16-0.2_hppa.deb
stable/main/binary-hppa/xsltproc_1.0.16-0.2_hppa.deb
stable/main/binary-hppa/libxslt1_1.0.16-0.2_hppa.deb
libxslt (1.0.16-0.2) stable; urgency=low
  * Include xsltInternals.h in transform.h, or else compilation might fail.
    Thanks to Marcel Meckel for reporting this.


stable/main/binary-arm/xsltproc_1.0.16-0.2_arm.deb
stable/main/binary-arm/libxslt1-dev_1.0.16-0.2_arm.deb
stable/main/binary-arm/libxslt1_1.0.16-0.2_arm.deb
libxslt (1.0.16-0.2) stable; urgency=low
  * Include xsltInternals.h in transform.h, or else compilation might fail.
    Thanks to Marcel Meckel for reporting this.


stable/main/binary-alpha/xsltproc_1.0.16-0.2_alpha.deb
stable/main/binary-alpha/libxslt1-dev_1.0.16-0.2_alpha.deb
stable/main/binary-alpha/libxslt1_1.0.16-0.2_alpha.deb
libxslt (1.0.16-0.2) stable; urgency=low
  * Include xsltInternals.h in transform.h, or else compilation might fail.
    Thanks to Marcel Meckel for reporting this.


stable/main/binary-i386/libxslt1_1.0.16-0.2_i386.deb
stable/main/binary-i386/libxslt1-dev_1.0.16-0.2_i386.deb
stable/main/binary-i386/xsltproc_1.0.16-0.2_i386.deb
stable/main/source/libxslt_1.0.16-0.2.diff.gz
stable/main/source/libxslt_1.0.16-0.2.dsc
libxslt (1.0.16-0.2) stable; urgency=low
  * Include xsltInternals.h in transform.h, or else compilation might fail.
    Thanks to Marcel Meckel for reporting this.


stable/main/binary-sparc/libxml2_2.4.19-4woody1_sparc.deb
stable/main/binary-sparc/libxml2-dev_2.4.19-4woody1_sparc.deb
libxml2 (2.4.19-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-s390/libxml2_2.4.19-4woody1_s390.deb
stable/main/binary-s390/libxml2-dev_2.4.19-4woody1_s390.deb
libxml2 (2.4.19-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-powerpc/libxml2_2.4.19-4woody1_powerpc.deb
stable/main/binary-powerpc/libxml2-dev_2.4.19-4woody1_powerpc.deb
libxml2 (2.4.19-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-mipsel/libxml2_2.4.19-4woody1_mipsel.deb
stable/main/binary-mipsel/libxml2-dev_2.4.19-4woody1_mipsel.deb
libxml2 (2.4.19-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-mips/libxml2_2.4.19-4woody1_mips.deb
stable/main/binary-mips/libxml2-dev_2.4.19-4woody1_mips.deb
libxml2 (2.4.19-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-m68k/libxml2-dev_2.4.19-4woody1_m68k.deb
stable/main/binary-m68k/libxml2_2.4.19-4woody1_m68k.deb
libxml2 (2.4.19-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-ia64/libxml2_2.4.19-4woody1_ia64.deb
stable/main/binary-ia64/libxml2-dev_2.4.19-4woody1_ia64.deb
libxml2 (2.4.19-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-hppa/libxml2_2.4.19-4woody1_hppa.deb
stable/main/binary-hppa/libxml2-dev_2.4.19-4woody1_hppa.deb
libxml2 (2.4.19-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-arm/libxml2-dev_2.4.19-4woody1_arm.deb
stable/main/binary-arm/libxml2_2.4.19-4woody1_arm.deb
libxml2 (2.4.19-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-alpha/libxml2-dev_2.4.19-4woody1_alpha.deb
stable/main/binary-alpha/libxml2_2.4.19-4woody1_alpha.deb
libxml2 (2.4.19-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-i386/libxml2-dev_2.4.19-4woody1_i386.deb
stable/main/source/libxml2_2.4.19-4woody1.dsc
stable/main/source/libxml2_2.4.19-4woody1.diff.gz
stable/main/binary-i386/libxml2_2.4.19-4woody1_i386.deb
libxml2 (2.4.19-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-sparc/libxml1_1.8.17-2woody1_sparc.deb
stable/main/binary-sparc/libxml-dev_1.8.17-2woody1_sparc.deb
libxml (1:1.8.17-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-s390/libxml1_1.8.17-2woody1_s390.deb
stable/main/binary-s390/libxml-dev_1.8.17-2woody1_s390.deb
libxml (1:1.8.17-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-powerpc/libxml1_1.8.17-2woody1_powerpc.deb
stable/main/binary-powerpc/libxml-dev_1.8.17-2woody1_powerpc.deb
libxml (1:1.8.17-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-mipsel/libxml1_1.8.17-2woody1_mipsel.deb
stable/main/binary-mipsel/libxml-dev_1.8.17-2woody1_mipsel.deb
libxml (1:1.8.17-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-mips/libxml1_1.8.17-2woody1_mips.deb
stable/main/binary-mips/libxml-dev_1.8.17-2woody1_mips.deb
libxml (1:1.8.17-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-m68k/libxml-dev_1.8.17-2woody1_m68k.deb
stable/main/binary-m68k/libxml1_1.8.17-2woody1_m68k.deb
libxml (1:1.8.17-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-ia64/libxml1_1.8.17-2woody1_ia64.deb
stable/main/binary-ia64/libxml-dev_1.8.17-2woody1_ia64.deb
libxml (1:1.8.17-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-hppa/libxml1_1.8.17-2woody1_hppa.deb
stable/main/binary-hppa/libxml-dev_1.8.17-2woody1_hppa.deb
libxml (1:1.8.17-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-arm/libxml-dev_1.8.17-2woody1_arm.deb
stable/main/binary-arm/libxml1_1.8.17-2woody1_arm.deb
libxml (1:1.8.17-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-alpha/libxml-dev_1.8.17-2woody1_alpha.deb
stable/main/binary-alpha/libxml1_1.8.17-2woody1_alpha.deb
libxml (1:1.8.17-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-i386/libxml-dev_1.8.17-2woody1_i386.deb
stable/main/binary-i386/libxml1_1.8.17-2woody1_i386.deb
stable/main/source/libxml_1.8.17-2woody1.diff.gz
stable/main/source/libxml_1.8.17-2woody1.dsc
libxml (1:1.8.17-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by upstream Daniel Veillard <veillard@redhat.com> to fix
    buffer overflows [nanohttp.c, nanoftp.c, CAN-2004-0110]


stable/main/binary-sparc/libpng-dev_1.2.1-1.1.woody.9_sparc.deb
stable/main/binary-sparc/libpng3_1.2.1-1.1.woody.9_sparc.deb
libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-s390/libpng-dev_1.2.1-1.1.woody.9_s390.deb
stable/main/binary-s390/libpng3_1.2.1-1.1.woody.9_s390.deb
libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-powerpc/libpng-dev_1.2.1-1.1.woody.9_powerpc.deb
stable/main/binary-powerpc/libpng3_1.2.1-1.1.woody.9_powerpc.deb
libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-mipsel/libpng-dev_1.2.1-1.1.woody.9_mipsel.deb
stable/main/binary-mipsel/libpng3_1.2.1-1.1.woody.9_mipsel.deb
libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-mips/libpng-dev_1.2.1-1.1.woody.9_mips.deb
stable/main/binary-mips/libpng3_1.2.1-1.1.woody.9_mips.deb
libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-m68k/libpng-dev_1.2.1-1.1.woody.9_m68k.deb
stable/main/binary-m68k/libpng3_1.2.1-1.1.woody.9_m68k.deb
libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-ia64/libpng-dev_1.2.1-1.1.woody.9_ia64.deb
stable/main/binary-ia64/libpng3_1.2.1-1.1.woody.9_ia64.deb
libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-hppa/libpng-dev_1.2.1-1.1.woody.9_hppa.deb
stable/main/binary-hppa/libpng3_1.2.1-1.1.woody.9_hppa.deb
libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-arm/libpng3_1.2.1-1.1.woody.9_arm.deb
stable/main/binary-arm/libpng-dev_1.2.1-1.1.woody.9_arm.deb
libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-alpha/libpng3_1.2.1-1.1.woody.9_alpha.deb
stable/main/binary-alpha/libpng-dev_1.2.1-1.1.woody.9_alpha.deb
libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/source/libpng3_1.2.1-1.1.woody.9.diff.gz
stable/main/source/libpng3_1.2.1-1.1.woody.9.dsc
stable/main/binary-i386/libpng3_1.2.1-1.1.woody.9_i386.deb
stable/main/binary-i386/libpng-dev_1.2.1-1.1.woody.9_i386.deb
libpng3 (1.2.1-1.1.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-sparc/libpng2_1.0.12-3.woody.9_sparc.deb
stable/main/binary-sparc/libpng2-dev_1.0.12-3.woody.9_sparc.deb
libpng (1.0.12-3.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-s390/libpng2-dev_1.0.12-3.woody.9_s390.deb
stable/main/binary-s390/libpng2_1.0.12-3.woody.9_s390.deb
libpng (1.0.12-3.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-powerpc/libpng2_1.0.12-3.woody.9_powerpc.deb
stable/main/binary-powerpc/libpng2-dev_1.0.12-3.woody.9_powerpc.deb
libpng (1.0.12-3.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-mipsel/libpng2-dev_1.0.12-3.woody.9_mipsel.deb
stable/main/binary-mipsel/libpng2_1.0.12-3.woody.9_mipsel.deb
libpng (1.0.12-3.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-mips/libpng2-dev_1.0.12-3.woody.9_mips.deb
stable/main/binary-mips/libpng2_1.0.12-3.woody.9_mips.deb
libpng (1.0.12-3.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-m68k/libpng2_1.0.12-3.woody.9_m68k.deb
stable/main/binary-m68k/libpng2-dev_1.0.12-3.woody.9_m68k.deb
libpng (1.0.12-3.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-ia64/libpng2-dev_1.0.12-3.woody.9_ia64.deb
stable/main/binary-ia64/libpng2_1.0.12-3.woody.9_ia64.deb
libpng (1.0.12-3.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-hppa/libpng2-dev_1.0.12-3.woody.9_hppa.deb
stable/main/binary-hppa/libpng2_1.0.12-3.woody.9_hppa.deb
libpng (1.0.12-3.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-arm/libpng2-dev_1.0.12-3.woody.9_arm.deb
stable/main/binary-arm/libpng2_1.0.12-3.woody.9_arm.deb
libpng (1.0.12-3.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-alpha/libpng2-dev_1.0.12-3.woody.9_alpha.deb
stable/main/binary-alpha/libpng2_1.0.12-3.woody.9_alpha.deb
libpng (1.0.12-3.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-i386/libpng2-dev_1.0.12-3.woody.9_i386.deb
stable/main/source/libpng_1.0.12-3.woody.9.diff.gz
stable/main/binary-i386/libpng2_1.0.12-3.woody.9_i386.deb
stable/main/source/libpng_1.0.12-3.woody.9.dsc
libpng (1.0.12-3.woody.9) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Reverted patch against pngrutil.c since it was only incomplete code
    reordering
  * The real patch was applied earlier already (CAN-2004-0597, DSA 536)


stable/main/binary-sparc/libnids1_1.16-3woody1_sparc.deb
stable/main/binary-sparc/libnids-dev_1.16-3woody1_sparc.deb
libnids (1.16-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix overflow with large TCP datagrams (CAN-2003-0850)
    [src/tcp.c]


stable/main/binary-s390/libnids1_1.16-3woody1_s390.deb
stable/main/binary-s390/libnids-dev_1.16-3woody1_s390.deb
libnids (1.16-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix overflow with large TCP datagrams (CAN-2003-0850)
    [src/tcp.c]


stable/main/binary-powerpc/libnids1_1.16-3woody1_powerpc.deb
stable/main/binary-powerpc/libnids-dev_1.16-3woody1_powerpc.deb
libnids (1.16-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix overflow with large TCP datagrams (CAN-2003-0850)
    [src/tcp.c]


stable/main/binary-mipsel/libnids1_1.16-3woody1_mipsel.deb
stable/main/binary-mipsel/libnids-dev_1.16-3woody1_mipsel.deb
libnids (1.16-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix overflow with large TCP datagrams (CAN-2003-0850)
    [src/tcp.c]


stable/main/binary-mips/libnids1_1.16-3woody1_mips.deb
stable/main/binary-mips/libnids-dev_1.16-3woody1_mips.deb
libnids (1.16-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix overflow with large TCP datagrams (CAN-2003-0850)
    [src/tcp.c]


stable/main/binary-m68k/libnids-dev_1.16-3woody1_m68k.deb
stable/main/binary-m68k/libnids1_1.16-3woody1_m68k.deb
libnids (1.16-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix overflow with large TCP datagrams (CAN-2003-0850)
    [src/tcp.c]


stable/main/binary-ia64/libnids1_1.16-3woody1_ia64.deb
stable/main/binary-ia64/libnids-dev_1.16-3woody1_ia64.deb
libnids (1.16-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix overflow with large TCP datagrams (CAN-2003-0850)
    [src/tcp.c]


stable/main/binary-hppa/libnids1_1.16-3woody1_hppa.deb
stable/main/binary-hppa/libnids-dev_1.16-3woody1_hppa.deb
libnids (1.16-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix overflow with large TCP datagrams (CAN-2003-0850)
    [src/tcp.c]


stable/main/binary-arm/libnids-dev_1.16-3woody1_arm.deb
stable/main/binary-arm/libnids1_1.16-3woody1_arm.deb
libnids (1.16-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix overflow with large TCP datagrams (CAN-2003-0850)
    [src/tcp.c]


stable/main/binary-alpha/libnids-dev_1.16-3woody1_alpha.deb
stable/main/binary-alpha/libnids1_1.16-3woody1_alpha.deb
libnids (1.16-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix overflow with large TCP datagrams (CAN-2003-0850)
    [src/tcp.c]


stable/main/binary-i386/libnids-dev_1.16-3woody1_i386.deb
stable/main/source/libnids_1.16-3woody1.diff.gz
stable/main/source/libnids_1.16-3woody1.dsc
stable/main/binary-i386/libnids1_1.16-3woody1_i386.deb
libnids (1.16-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix overflow with large TCP datagrams (CAN-2003-0850)
    [src/tcp.c]


stable/main/binary-sparc/libgtop-dev_1.0.13-3.1_sparc.deb
stable/main/binary-sparc/libgtop1_1.0.13-3.1_sparc.deb
stable/main/binary-sparc/libgtop-daemon_1.0.13-3.1_sparc.deb
libgtop (1.0.13-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in src/daemon/gnuserv.c
    (Closes: #182545)


stable/main/binary-s390/libgtop-daemon_1.0.13-3.1_s390.deb
stable/main/binary-s390/libgtop1_1.0.13-3.1_s390.deb
stable/main/binary-s390/libgtop-dev_1.0.13-3.1_s390.deb
libgtop (1.0.13-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in src/daemon/gnuserv.c
    (Closes: #182545)


stable/main/binary-powerpc/libgtop-dev_1.0.13-3.1_powerpc.deb
stable/main/binary-powerpc/libgtop1_1.0.13-3.1_powerpc.deb
stable/main/binary-powerpc/libgtop-daemon_1.0.13-3.1_powerpc.deb
libgtop (1.0.13-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in src/daemon/gnuserv.c
    (Closes: #182545)


stable/main/binary-mipsel/libgtop-daemon_1.0.13-3.1_mipsel.deb
stable/main/binary-mipsel/libgtop1_1.0.13-3.1_mipsel.deb
stable/main/binary-mipsel/libgtop-dev_1.0.13-3.1_mipsel.deb
libgtop (1.0.13-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in src/daemon/gnuserv.c
    (Closes: #182545)


stable/main/binary-mips/libgtop-daemon_1.0.13-3.1_mips.deb
stable/main/binary-mips/libgtop1_1.0.13-3.1_mips.deb
stable/main/binary-mips/libgtop-dev_1.0.13-3.1_mips.deb
libgtop (1.0.13-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in src/daemon/gnuserv.c
    (Closes: #182545)


stable/main/binary-m68k/libgtop-daemon_1.0.13-3.1_m68k.deb
stable/main/binary-m68k/libgtop-dev_1.0.13-3.1_m68k.deb
stable/main/binary-m68k/libgtop1_1.0.13-3.1_m68k.deb
libgtop (1.0.13-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in src/daemon/gnuserv.c
    (Closes: #182545)


stable/main/binary-ia64/libgtop-dev_1.0.13-3.1_ia64.deb
stable/main/binary-ia64/libgtop-daemon_1.0.13-3.1_ia64.deb
stable/main/binary-ia64/libgtop1_1.0.13-3.1_ia64.deb
libgtop (1.0.13-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in src/daemon/gnuserv.c
    (Closes: #182545)


stable/main/binary-hppa/libgtop1_1.0.13-3.1_hppa.deb
stable/main/binary-hppa/libgtop-daemon_1.0.13-3.1_hppa.deb
stable/main/binary-hppa/libgtop-dev_1.0.13-3.1_hppa.deb
libgtop (1.0.13-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in src/daemon/gnuserv.c
    (Closes: #182545)


stable/main/binary-arm/libgtop-daemon_1.0.13-3.1_arm.deb
stable/main/binary-arm/libgtop1_1.0.13-3.1_arm.deb
stable/main/binary-arm/libgtop-dev_1.0.13-3.1_arm.deb
libgtop (1.0.13-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in src/daemon/gnuserv.c
    (Closes: #182545)


stable/main/binary-alpha/libgtop-daemon_1.0.13-3.1_alpha.deb
stable/main/binary-alpha/libgtop1_1.0.13-3.1_alpha.deb
stable/main/binary-alpha/libgtop-dev_1.0.13-3.1_alpha.deb
libgtop (1.0.13-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in src/daemon/gnuserv.c
    (Closes: #182545)


stable/main/binary-i386/libgtop-dev_1.0.13-3.1_i386.deb
stable/main/binary-i386/libgtop1_1.0.13-3.1_i386.deb
stable/main/binary-i386/libgtop-daemon_1.0.13-3.1_i386.deb
stable/main/source/libgtop_1.0.13-3.1.dsc
stable/main/source/libgtop_1.0.13-3.1.diff.gz
libgtop (1.0.13-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in src/daemon/gnuserv.c
    (Closes: #182545)


stable/main/binary-sparc/libapache-mod-python_2.7.8-0.0woody2_sparc.deb
libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high
  * Security update for woody. This release is the same as the previous
    release, with a fix backported from 3.0.4 to fix a denial of service
    bug. (CAN-2003-0973) (closes: #222828)


stable/main/binary-s390/libapache-mod-python_2.7.8-0.0woody2_s390.deb
libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high
  * Security update for woody. This release is the same as the previous
    release, with a fix backported from 3.0.4 to fix a denial of service
    bug. (CAN-2003-0973) (closes: #222828)


stable/main/binary-powerpc/libapache-mod-python_2.7.8-0.0woody2_powerpc.deb
libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high
  * Security update for woody. This release is the same as the previous
    release, with a fix backported from 3.0.4 to fix a denial of service
    bug. (CAN-2003-0973) (closes: #222828)


stable/main/binary-mipsel/libapache-mod-python_2.7.8-0.0woody2_mipsel.deb
libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high
  * Security update for woody. This release is the same as the previous
    release, with a fix backported from 3.0.4 to fix a denial of service
    bug. (CAN-2003-0973) (closes: #222828)


stable/main/binary-mips/libapache-mod-python_2.7.8-0.0woody2_mips.deb
libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high
  * Security update for woody. This release is the same as the previous
    release, with a fix backported from 3.0.4 to fix a denial of service
    bug. (CAN-2003-0973) (closes: #222828)


stable/main/binary-m68k/libapache-mod-python_2.7.8-0.0woody2_m68k.deb
libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high
  * Security update for woody. This release is the same as the previous
    release, with a fix backported from 3.0.4 to fix a denial of service
    bug. (CAN-2003-0973) (closes: #222828)


stable/main/binary-ia64/libapache-mod-python_2.7.8-0.0woody2_ia64.deb
libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high
  * Security update for woody. This release is the same as the previous
    release, with a fix backported from 3.0.4 to fix a denial of service
    bug. (CAN-2003-0973) (closes: #222828)


stable/main/binary-hppa/libapache-mod-python_2.7.8-0.0woody2_hppa.deb
libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high
  * Security update for woody. This release is the same as the previous
    release, with a fix backported from 3.0.4 to fix a denial of service
    bug. (CAN-2003-0973) (closes: #222828)


stable/main/binary-arm/libapache-mod-python_2.7.8-0.0woody2_arm.deb
libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high
  * Security update for woody. This release is the same as the previous
    release, with a fix backported from 3.0.4 to fix a denial of service
    bug. (CAN-2003-0973) (closes: #222828)


stable/main/binary-alpha/libapache-mod-python_2.7.8-0.0woody2_alpha.deb
libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high
  * Security update for woody. This release is the same as the previous
    release, with a fix backported from 3.0.4 to fix a denial of service
    bug. (CAN-2003-0973) (closes: #222828)


stable/main/binary-i386/libapache-mod-python_2.7.8-0.0woody2_i386.deb
stable/main/source/libapache-mod-python_2.7.8-0.0woody2.diff.gz
stable/main/source/libapache-mod-python_2.7.8-0.0woody2.dsc
libapache-mod-python (2:2.7.8-0.0woody2) stable-security; urgency=high
  * Security update for woody. This release is the same as the previous
    release, with a fix backported from 3.0.4 to fix a denial of service
    bug. (CAN-2003-0973) (closes: #222828)


stable/main/binary-sparc/libapache-mod-dav_1.0.3-3.1_sparc.deb
libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream bug to fix a NULL pointer dereference (DoS)
    [dav_fs_lock.c, CAN-2004-0809]


stable/main/binary-s390/libapache-mod-dav_1.0.3-3.1_s390.deb
libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream bug to fix a NULL pointer dereference (DoS)
    [dav_fs_lock.c, CAN-2004-0809]


stable/main/binary-powerpc/libapache-mod-dav_1.0.3-3.1_powerpc.deb
libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream bug to fix a NULL pointer dereference (DoS)
    [dav_fs_lock.c, CAN-2004-0809]


stable/main/binary-mipsel/libapache-mod-dav_1.0.3-3.1_mipsel.deb
libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream bug to fix a NULL pointer dereference (DoS)
    [dav_fs_lock.c, CAN-2004-0809]


stable/main/binary-mips/libapache-mod-dav_1.0.3-3.1_mips.deb
libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream bug to fix a NULL pointer dereference (DoS)
    [dav_fs_lock.c, CAN-2004-0809]


stable/main/binary-m68k/libapache-mod-dav_1.0.3-3.1_m68k.deb
libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream bug to fix a NULL pointer dereference (DoS)
    [dav_fs_lock.c, CAN-2004-0809]


stable/main/binary-ia64/libapache-mod-dav_1.0.3-3.1_ia64.deb
libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream bug to fix a NULL pointer dereference (DoS)
    [dav_fs_lock.c, CAN-2004-0809]


stable/main/binary-hppa/libapache-mod-dav_1.0.3-3.1_hppa.deb
libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream bug to fix a NULL pointer dereference (DoS)
    [dav_fs_lock.c, CAN-2004-0809]


stable/main/binary-arm/libapache-mod-dav_1.0.3-3.1_arm.deb
libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream bug to fix a NULL pointer dereference (DoS)
    [dav_fs_lock.c, CAN-2004-0809]


stable/main/binary-alpha/libapache-mod-dav_1.0.3-3.1_alpha.deb
libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream bug to fix a NULL pointer dereference (DoS)
    [dav_fs_lock.c, CAN-2004-0809]


stable/main/source/libapache-mod-dav_1.0.3-3.1.diff.gz
stable/main/binary-i386/libapache-mod-dav_1.0.3-3.1_i386.deb
stable/main/source/libapache-mod-dav_1.0.3-3.1.dsc
libapache-mod-dav (1.0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream bug to fix a NULL pointer dereference (DoS)
    [dav_fs_lock.c, CAN-2004-0809]


stable/main/binary-sparc/lftp_2.4.9-1woody2_sparc.deb
lftp (2.4.9-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-s390/lftp_2.4.9-1woody2_s390.deb
lftp (2.4.9-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-powerpc/lftp_2.4.9-1woody2_powerpc.deb
lftp (2.4.9-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-mipsel/lftp_2.4.9-1woody2_mipsel.deb
lftp (2.4.9-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-mips/lftp_2.4.9-1woody2_mips.deb
lftp (2.4.9-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-m68k/lftp_2.4.9-1woody2_m68k.deb
lftp (2.4.9-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-ia64/lftp_2.4.9-1woody2_ia64.deb
lftp (2.4.9-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-hppa/lftp_2.4.9-1woody2_hppa.deb
lftp (2.4.9-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-arm/lftp_2.4.9-1woody2_arm.deb
lftp (2.4.9-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-alpha/lftp_2.4.9-1woody2_alpha.deb
lftp (2.4.9-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/source/lftp_2.4.9-1woody2.dsc
stable/main/binary-i386/lftp_2.4.9-1woody2_i386.deb
stable/main/source/lftp_2.4.9-1woody2.diff.gz
lftp (2.4.9-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch config.guess to recognize mipsel


stable/main/binary-sparc/lesstif1_0.93.18-5_sparc.deb
stable/main/binary-sparc/lesstif-dev_0.93.18-5_sparc.deb
stable/main/binary-sparc/lesstif-bin_0.93.18-5_sparc.deb
stable/main/binary-sparc/lesstif-dbg_0.93.18-5_sparc.deb
lesstif1-1 (1:0.93.18-5) stable-security; urgency=high
  * New maintainer release
  * Adjusted Maintainer field
  * Applied upstream security fix to fix recent XPM vulnerabilities
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm
    Modified files:
     - lib/Xm/LTXpm.c
     - lib/Xm-2.0/Xpm.c
     - include/Motif-1.2/XmI/XmXpmI.h
     - include/Motif-2.0/XmI/XpmI.h
     - include/Motif-2.1/XmI/XmXpmI.h
     - include/Motif-2.1/XmI/XpmI.h


stable/main/binary-s390/lesstif-dev_0.93.18-5_s390.deb
stable/main/binary-s390/lesstif-bin_0.93.18-5_s390.deb
stable/main/binary-s390/lesstif1_0.93.18-5_s390.deb
stable/main/binary-s390/lesstif-dbg_0.93.18-5_s390.deb
lesstif1-1 (1:0.93.18-5) stable-security; urgency=high
  * New maintainer release
  * Adjusted Maintainer field
  * Applied upstream security fix to fix recent XPM vulnerabilities
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm
    Modified files:
     - lib/Xm/LTXpm.c
     - lib/Xm-2.0/Xpm.c
     - include/Motif-1.2/XmI/XmXpmI.h
     - include/Motif-2.0/XmI/XpmI.h
     - include/Motif-2.1/XmI/XmXpmI.h
     - include/Motif-2.1/XmI/XpmI.h


stable/main/binary-powerpc/lesstif-bin_0.93.18-5_powerpc.deb
stable/main/binary-powerpc/lesstif-dbg_0.93.18-5_powerpc.deb
stable/main/binary-powerpc/lesstif1_0.93.18-5_powerpc.deb
stable/main/binary-powerpc/lesstif-dev_0.93.18-5_powerpc.deb
lesstif1-1 (1:0.93.18-5) stable-security; urgency=high
  * New maintainer release
  * Adjusted Maintainer field
  * Applied upstream security fix to fix recent XPM vulnerabilities
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm
    Modified files:
     - lib/Xm/LTXpm.c
     - lib/Xm-2.0/Xpm.c
     - include/Motif-1.2/XmI/XmXpmI.h
     - include/Motif-2.0/XmI/XpmI.h
     - include/Motif-2.1/XmI/XmXpmI.h
     - include/Motif-2.1/XmI/XpmI.h


stable/main/binary-mipsel/lesstif-dev_0.93.18-5_mipsel.deb
stable/main/binary-mipsel/lesstif1_0.93.18-5_mipsel.deb
stable/main/binary-mipsel/lesstif-bin_0.93.18-5_mipsel.deb
stable/main/binary-mipsel/lesstif-dbg_0.93.18-5_mipsel.deb
lesstif1-1 (1:0.93.18-5) stable-security; urgency=high
  * New maintainer release
  * Adjusted Maintainer field
  * Applied upstream security fix to fix recent XPM vulnerabilities
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm
    Modified files:
     - lib/Xm/LTXpm.c
     - lib/Xm-2.0/Xpm.c
     - include/Motif-1.2/XmI/XmXpmI.h
     - include/Motif-2.0/XmI/XpmI.h
     - include/Motif-2.1/XmI/XmXpmI.h
     - include/Motif-2.1/XmI/XpmI.h


stable/main/binary-mips/lesstif-bin_0.93.18-5_mips.deb
stable/main/binary-mips/lesstif1_0.93.18-5_mips.deb
stable/main/binary-mips/lesstif-dev_0.93.18-5_mips.deb
stable/main/binary-mips/lesstif-dbg_0.93.18-5_mips.deb
lesstif1-1 (1:0.93.18-5) stable-security; urgency=high
  * New maintainer release
  * Adjusted Maintainer field
  * Applied upstream security fix to fix recent XPM vulnerabilities
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm
    Modified files:
     - lib/Xm/LTXpm.c
     - lib/Xm-2.0/Xpm.c
     - include/Motif-1.2/XmI/XmXpmI.h
     - include/Motif-2.0/XmI/XpmI.h
     - include/Motif-2.1/XmI/XmXpmI.h
     - include/Motif-2.1/XmI/XpmI.h


stable/main/binary-m68k/lesstif1_0.93.18-5_m68k.deb
stable/main/binary-m68k/lesstif-bin_0.93.18-5_m68k.deb
stable/main/binary-m68k/lesstif-dbg_0.93.18-5_m68k.deb
stable/main/binary-m68k/lesstif-dev_0.93.18-5_m68k.deb
lesstif1-1 (1:0.93.18-5) stable-security; urgency=high
  * New maintainer release
  * Adjusted Maintainer field
  * Applied upstream security fix to fix recent XPM vulnerabilities
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm
    Modified files:
     - lib/Xm/LTXpm.c
     - lib/Xm-2.0/Xpm.c
     - include/Motif-1.2/XmI/XmXpmI.h
     - include/Motif-2.0/XmI/XpmI.h
     - include/Motif-2.1/XmI/XmXpmI.h
     - include/Motif-2.1/XmI/XpmI.h


stable/main/binary-ia64/lesstif1_0.93.18-5_ia64.deb
stable/main/binary-ia64/lesstif-dbg_0.93.18-5_ia64.deb
stable/main/binary-ia64/lesstif-bin_0.93.18-5_ia64.deb
stable/main/binary-ia64/lesstif-dev_0.93.18-5_ia64.deb
lesstif1-1 (1:0.93.18-5) stable-security; urgency=high
  * New maintainer release
  * Adjusted Maintainer field
  * Applied upstream security fix to fix recent XPM vulnerabilities
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm
    Modified files:
     - lib/Xm/LTXpm.c
     - lib/Xm-2.0/Xpm.c
     - include/Motif-1.2/XmI/XmXpmI.h
     - include/Motif-2.0/XmI/XpmI.h
     - include/Motif-2.1/XmI/XmXpmI.h
     - include/Motif-2.1/XmI/XpmI.h


stable/main/binary-hppa/lesstif-dev_0.93.18-5_hppa.deb
stable/main/binary-hppa/lesstif-bin_0.93.18-5_hppa.deb
stable/main/binary-hppa/lesstif1_0.93.18-5_hppa.deb
stable/main/binary-hppa/lesstif-dbg_0.93.18-5_hppa.deb
lesstif1-1 (1:0.93.18-5) stable-security; urgency=high
  * New maintainer release
  * Adjusted Maintainer field
  * Applied upstream security fix to fix recent XPM vulnerabilities
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm
    Modified files:
     - lib/Xm/LTXpm.c
     - lib/Xm-2.0/Xpm.c
     - include/Motif-1.2/XmI/XmXpmI.h
     - include/Motif-2.0/XmI/XpmI.h
     - include/Motif-2.1/XmI/XmXpmI.h
     - include/Motif-2.1/XmI/XpmI.h


stable/main/binary-arm/lesstif-dev_0.93.18-5_arm.deb
stable/main/binary-arm/lesstif-dbg_0.93.18-5_arm.deb
stable/main/binary-arm/lesstif1_0.93.18-5_arm.deb
stable/main/binary-arm/lesstif-bin_0.93.18-5_arm.deb
lesstif1-1 (1:0.93.18-5) stable-security; urgency=high
  * New maintainer release
  * Adjusted Maintainer field
  * Applied upstream security fix to fix recent XPM vulnerabilities
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm
    Modified files:
     - lib/Xm/LTXpm.c
     - lib/Xm-2.0/Xpm.c
     - include/Motif-1.2/XmI/XmXpmI.h
     - include/Motif-2.0/XmI/XpmI.h
     - include/Motif-2.1/XmI/XmXpmI.h
     - include/Motif-2.1/XmI/XpmI.h


stable/main/binary-alpha/lesstif-dev_0.93.18-5_alpha.deb
stable/main/binary-alpha/lesstif1_0.93.18-5_alpha.deb
stable/main/binary-alpha/lesstif-bin_0.93.18-5_alpha.deb
stable/main/binary-alpha/lesstif-dbg_0.93.18-5_alpha.deb
lesstif1-1 (1:0.93.18-5) stable-security; urgency=high
  * New maintainer release
  * Adjusted Maintainer field
  * Applied upstream security fix to fix recent XPM vulnerabilities
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm
    Modified files:
     - lib/Xm/LTXpm.c
     - lib/Xm-2.0/Xpm.c
     - include/Motif-1.2/XmI/XmXpmI.h
     - include/Motif-2.0/XmI/XpmI.h
     - include/Motif-2.1/XmI/XmXpmI.h
     - include/Motif-2.1/XmI/XpmI.h


stable/main/binary-all/lesstif-doc_0.93.18-5_all.deb
stable/main/source/lesstif1-1_0.93.18-5.dsc
stable/main/binary-i386/lesstif-dev_0.93.18-5_i386.deb
stable/main/binary-i386/lesstif-bin_0.93.18-5_i386.deb
stable/main/source/lesstif1-1_0.93.18-5.diff.gz
stable/main/binary-i386/lesstif-dbg_0.93.18-5_i386.deb
stable/main/binary-i386/lesstif1_0.93.18-5_i386.deb
lesstif1-1 (1:0.93.18-5) stable-security; urgency=high
  * New maintainer release
  * Adjusted Maintainer field
  * Applied upstream security fix to fix recent XPM vulnerabilities
    + CAN-2004-0687: stack overflows in libXpm
    + CAN-2004-0688: integer overflows in libXpm
    Modified files:
     - lib/Xm/LTXpm.c
     - lib/Xm-2.0/Xpm.c
     - include/Motif-1.2/XmI/XmXpmI.h
     - include/Motif-2.0/XmI/XpmI.h
     - include/Motif-2.1/XmI/XmXpmI.h
     - include/Motif-2.1/XmI/XpmI.h


stable/main/binary-sparc/lbreakout2_2.2.2-1woody1_sparc.deb
lbreakout2 (2.2.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix numerous buffer overflows due to improper use of environmental
    variables (CAN-2004-0158).


stable/main/binary-s390/lbreakout2_2.2.2-1woody1_s390.deb
lbreakout2 (2.2.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix numerous buffer overflows due to improper use of environmental
    variables (CAN-2004-0158).


stable/main/binary-powerpc/lbreakout2_2.2.2-1woody1_powerpc.deb
lbreakout2 (2.2.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix numerous buffer overflows due to improper use of environmental
    variables (CAN-2004-0158).


stable/main/binary-mipsel/lbreakout2_2.2.2-1woody1_mipsel.deb
lbreakout2 (2.2.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix numerous buffer overflows due to improper use of environmental
    variables (CAN-2004-0158).


stable/main/binary-mips/lbreakout2_2.2.2-1woody1_mips.deb
lbreakout2 (2.2.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix numerous buffer overflows due to improper use of environmental
    variables (CAN-2004-0158).


stable/main/binary-m68k/lbreakout2_2.2.2-1woody1_m68k.deb
lbreakout2 (2.2.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix numerous buffer overflows due to improper use of environmental
    variables (CAN-2004-0158).


stable/main/binary-ia64/lbreakout2_2.2.2-1woody1_ia64.deb
lbreakout2 (2.2.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix numerous buffer overflows due to improper use of environmental
    variables (CAN-2004-0158).


stable/main/binary-hppa/lbreakout2_2.2.2-1woody1_hppa.deb
lbreakout2 (2.2.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix numerous buffer overflows due to improper use of environmental
    variables (CAN-2004-0158).


stable/main/binary-arm/lbreakout2_2.2.2-1woody1_arm.deb
lbreakout2 (2.2.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix numerous buffer overflows due to improper use of environmental
    variables (CAN-2004-0158).


stable/main/binary-alpha/lbreakout2_2.2.2-1woody1_alpha.deb
lbreakout2 (2.2.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix numerous buffer overflows due to improper use of environmental
    variables (CAN-2004-0158).


stable/main/source/lbreakout2_2.2.2-1woody1.dsc
stable/main/source/lbreakout2_2.2.2-1woody1.diff.gz
stable/main/binary-i386/lbreakout2_2.2.2-1woody1_i386.deb
lbreakout2 (2.2.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix numerous buffer overflows due to improper use of environmental
    variables (CAN-2004-0158).


stable/main/binary-sparc/libkrb5-dev_1.2.4-5woody6_sparc.deb
stable/main/binary-sparc/krb5-rsh-server_1.2.4-5woody6_sparc.deb
stable/main/binary-sparc/krb5-ftpd_1.2.4-5woody6_sparc.deb
stable/main/binary-sparc/krb5-telnetd_1.2.4-5woody6_sparc.deb
stable/main/binary-sparc/krb5-user_1.2.4-5woody6_sparc.deb
stable/main/binary-sparc/krb5-admin-server_1.2.4-5woody6_sparc.deb
stable/main/binary-sparc/libkrb53_1.2.4-5woody6_sparc.deb
stable/main/binary-sparc/krb5-clients_1.2.4-5woody6_sparc.deb
stable/main/binary-sparc/krb5-kdc_1.2.4-5woody6_sparc.deb
stable/main/binary-sparc/libkadm55_1.2.4-5woody6_sparc.deb
krb5 (1.2.4-5woody6) stable-security; urgency=high
  * KDC and clients double-free on error conditions (CAN-2004-0642)
  * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643)
  * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and
    earlier allows unauthenticated remote attackers to induce
    infinite loop, causing denial of service, including in KDC
    code (CAN-2004-0644)
  * Update double free patch to include an additional rd_cred case


stable/main/binary-s390/krb5-admin-server_1.2.4-5woody6_s390.deb
stable/main/binary-s390/krb5-kdc_1.2.4-5woody6_s390.deb
stable/main/binary-s390/krb5-rsh-server_1.2.4-5woody6_s390.deb
stable/main/binary-s390/libkrb53_1.2.4-5woody6_s390.deb
stable/main/binary-s390/libkadm55_1.2.4-5woody6_s390.deb
stable/main/binary-s390/krb5-telnetd_1.2.4-5woody6_s390.deb
stable/main/binary-s390/krb5-user_1.2.4-5woody6_s390.deb
stable/main/binary-s390/krb5-ftpd_1.2.4-5woody6_s390.deb
stable/main/binary-s390/krb5-clients_1.2.4-5woody6_s390.deb
stable/main/binary-s390/libkrb5-dev_1.2.4-5woody6_s390.deb
krb5 (1.2.4-5woody6) stable-security; urgency=high
  * KDC and clients double-free on error conditions (CAN-2004-0642)
  * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643)
  * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and
    earlier allows unauthenticated remote attackers to induce
    infinite loop, causing denial of service, including in KDC
    code (CAN-2004-0644)
  * Update double free patch to include an additional rd_cred case


stable/main/binary-powerpc/libkrb53_1.2.4-5woody6_powerpc.deb
stable/main/binary-powerpc/krb5-rsh-server_1.2.4-5woody6_powerpc.deb
stable/main/binary-powerpc/krb5-user_1.2.4-5woody6_powerpc.deb
stable/main/binary-powerpc/krb5-admin-server_1.2.4-5woody6_powerpc.deb
stable/main/binary-powerpc/libkadm55_1.2.4-5woody6_powerpc.deb
stable/main/binary-powerpc/krb5-kdc_1.2.4-5woody6_powerpc.deb
stable/main/binary-powerpc/krb5-ftpd_1.2.4-5woody6_powerpc.deb
stable/main/binary-powerpc/libkrb5-dev_1.2.4-5woody6_powerpc.deb
stable/main/binary-powerpc/krb5-clients_1.2.4-5woody6_powerpc.deb
stable/main/binary-powerpc/krb5-telnetd_1.2.4-5woody6_powerpc.deb
krb5 (1.2.4-5woody6) stable-security; urgency=high
  * KDC and clients double-free on error conditions (CAN-2004-0642)
  * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643)
  * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and
    earlier allows unauthenticated remote attackers to induce
    infinite loop, causing denial of service, including in KDC
    code (CAN-2004-0644)
  * Update double free patch to include an additional rd_cred case


stable/main/binary-mipsel/libkrb5-dev_1.2.4-5woody6_mipsel.deb
stable/main/binary-mipsel/libkadm55_1.2.4-5woody6_mipsel.deb
stable/main/binary-mipsel/krb5-ftpd_1.2.4-5woody6_mipsel.deb
stable/main/binary-mipsel/krb5-telnetd_1.2.4-5woody6_mipsel.deb
stable/main/binary-mipsel/krb5-kdc_1.2.4-5woody6_mipsel.deb
stable/main/binary-mipsel/krb5-clients_1.2.4-5woody6_mipsel.deb
stable/main/binary-mipsel/krb5-user_1.2.4-5woody6_mipsel.deb
stable/main/binary-mipsel/krb5-admin-server_1.2.4-5woody6_mipsel.deb
stable/main/binary-mipsel/libkrb53_1.2.4-5woody6_mipsel.deb
stable/main/binary-mipsel/krb5-rsh-server_1.2.4-5woody6_mipsel.deb
krb5 (1.2.4-5woody6) stable-security; urgency=high
  * KDC and clients double-free on error conditions (CAN-2004-0642)
  * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643)
  * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and
    earlier allows unauthenticated remote attackers to induce
    infinite loop, causing denial of service, including in KDC
    code (CAN-2004-0644)
  * Update double free patch to include an additional rd_cred case


stable/main/binary-mips/libkadm55_1.2.4-5woody6_mips.deb
stable/main/binary-mips/krb5-ftpd_1.2.4-5woody6_mips.deb
stable/main/binary-mips/krb5-clients_1.2.4-5woody6_mips.deb
stable/main/binary-mips/libkrb5-dev_1.2.4-5woody6_mips.deb
stable/main/binary-mips/krb5-kdc_1.2.4-5woody6_mips.deb
stable/main/binary-mips/krb5-telnetd_1.2.4-5woody6_mips.deb
stable/main/binary-mips/krb5-admin-server_1.2.4-5woody6_mips.deb
stable/main/binary-mips/krb5-user_1.2.4-5woody6_mips.deb
stable/main/binary-mips/krb5-rsh-server_1.2.4-5woody6_mips.deb
stable/main/binary-mips/libkrb53_1.2.4-5woody6_mips.deb
krb5 (1.2.4-5woody6) stable-security; urgency=high
  * KDC and clients double-free on error conditions (CAN-2004-0642)
  * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643)
  * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and
    earlier allows unauthenticated remote attackers to induce
    infinite loop, causing denial of service, including in KDC
    code (CAN-2004-0644)
  * Update double free patch to include an additional rd_cred case


stable/main/binary-m68k/krb5-admin-server_1.2.4-5woody6_m68k.deb
stable/main/binary-m68k/libkrb5-dev_1.2.4-5woody6_m68k.deb
stable/main/binary-m68k/krb5-clients_1.2.4-5woody6_m68k.deb
stable/main/binary-m68k/krb5-ftpd_1.2.4-5woody6_m68k.deb
stable/main/binary-m68k/krb5-user_1.2.4-5woody6_m68k.deb
stable/main/binary-m68k/libkadm55_1.2.4-5woody6_m68k.deb
stable/main/binary-m68k/krb5-kdc_1.2.4-5woody6_m68k.deb
stable/main/binary-m68k/krb5-telnetd_1.2.4-5woody6_m68k.deb
stable/main/binary-m68k/krb5-rsh-server_1.2.4-5woody6_m68k.deb
stable/main/binary-m68k/libkrb53_1.2.4-5woody6_m68k.deb
krb5 (1.2.4-5woody6) stable-security; urgency=high
  * KDC and clients double-free on error conditions (CAN-2004-0642)
  * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643)
  * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and
    earlier allows unauthenticated remote attackers to induce
    infinite loop, causing denial of service, including in KDC
    code (CAN-2004-0644)
  * Update double free patch to include an additional rd_cred case


stable/main/binary-ia64/krb5-telnetd_1.2.4-5woody6_ia64.deb
stable/main/binary-ia64/libkadm55_1.2.4-5woody6_ia64.deb
stable/main/binary-ia64/krb5-kdc_1.2.4-5woody6_ia64.deb
stable/main/binary-ia64/krb5-admin-server_1.2.4-5woody6_ia64.deb
stable/main/binary-ia64/krb5-user_1.2.4-5woody6_ia64.deb
stable/main/binary-ia64/libkrb53_1.2.4-5woody6_ia64.deb
stable/main/binary-ia64/krb5-rsh-server_1.2.4-5woody6_ia64.deb
stable/main/binary-ia64/krb5-ftpd_1.2.4-5woody6_ia64.deb
stable/main/binary-ia64/libkrb5-dev_1.2.4-5woody6_ia64.deb
stable/main/binary-ia64/krb5-clients_1.2.4-5woody6_ia64.deb
krb5 (1.2.4-5woody6) stable-security; urgency=high
  * KDC and clients double-free on error conditions (CAN-2004-0642)
  * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643)
  * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and
    earlier allows unauthenticated remote attackers to induce
    infinite loop, causing denial of service, including in KDC
    code (CAN-2004-0644)
  * Update double free patch to include an additional rd_cred case


stable/main/binary-i386/libkrb53_1.2.4-5woody6_i386.deb
stable/main/binary-i386/krb5-clients_1.2.4-5woody6_i386.deb
stable/main/binary-i386/krb5-ftpd_1.2.4-5woody6_i386.deb
stable/main/binary-i386/krb5-rsh-server_1.2.4-5woody6_i386.deb
stable/main/binary-i386/libkadm55_1.2.4-5woody6_i386.deb
stable/main/binary-i386/libkrb5-dev_1.2.4-5woody6_i386.deb
stable/main/binary-i386/krb5-user_1.2.4-5woody6_i386.deb
stable/main/binary-i386/krb5-admin-server_1.2.4-5woody6_i386.deb
stable/main/binary-i386/krb5-telnetd_1.2.4-5woody6_i386.deb
stable/main/binary-i386/krb5-kdc_1.2.4-5woody6_i386.deb
krb5 (1.2.4-5woody6) stable-security; urgency=high
  * KDC and clients double-free on error conditions (CAN-2004-0642)
  * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643)
  * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and
    earlier allows unauthenticated remote attackers to induce
    infinite loop, causing denial of service, including in KDC
    code (CAN-2004-0644)
  * Update double free patch to include an additional rd_cred case


stable/main/binary-hppa/krb5-ftpd_1.2.4-5woody6_hppa.deb
stable/main/binary-hppa/krb5-clients_1.2.4-5woody6_hppa.deb
stable/main/binary-hppa/libkrb5-dev_1.2.4-5woody6_hppa.deb
stable/main/binary-hppa/krb5-user_1.2.4-5woody6_hppa.deb
stable/main/binary-hppa/krb5-telnetd_1.2.4-5woody6_hppa.deb
stable/main/binary-hppa/krb5-admin-server_1.2.4-5woody6_hppa.deb
stable/main/binary-hppa/krb5-kdc_1.2.4-5woody6_hppa.deb
stable/main/binary-hppa/libkadm55_1.2.4-5woody6_hppa.deb
stable/main/binary-hppa/krb5-rsh-server_1.2.4-5woody6_hppa.deb
stable/main/binary-hppa/libkrb53_1.2.4-5woody6_hppa.deb
krb5 (1.2.4-5woody6) stable-security; urgency=high
  * KDC and clients double-free on error conditions (CAN-2004-0642)
  * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643)
  * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and
    earlier allows unauthenticated remote attackers to induce
    infinite loop, causing denial of service, including in KDC
    code (CAN-2004-0644)
  * Update double free patch to include an additional rd_cred case


stable/main/binary-arm/krb5-admin-server_1.2.4-5woody6_arm.deb
stable/main/binary-arm/krb5-clients_1.2.4-5woody6_arm.deb
stable/main/binary-arm/krb5-telnetd_1.2.4-5woody6_arm.deb
stable/main/binary-arm/krb5-ftpd_1.2.4-5woody6_arm.deb
stable/main/binary-arm/krb5-kdc_1.2.4-5woody6_arm.deb
stable/main/binary-arm/libkadm55_1.2.4-5woody6_arm.deb
stable/main/binary-arm/krb5-user_1.2.4-5woody6_arm.deb
stable/main/binary-arm/libkrb5-dev_1.2.4-5woody6_arm.deb
stable/main/binary-arm/krb5-rsh-server_1.2.4-5woody6_arm.deb
stable/main/binary-arm/libkrb53_1.2.4-5woody6_arm.deb
krb5 (1.2.4-5woody6) stable-security; urgency=high
  * KDC and clients double-free on error conditions (CAN-2004-0642)
  * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643)
  * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and
    earlier allows unauthenticated remote attackers to induce
    infinite loop, causing denial of service, including in KDC
    code (CAN-2004-0644)
  * Update double free patch to include an additional rd_cred case


stable/main/binary-all/krb5-doc_1.2.4-5woody6_all.deb
stable/main/source/krb5_1.2.4-5woody6.diff.gz
stable/main/binary-alpha/krb5-rsh-server_1.2.4-5woody6_alpha.deb
stable/main/source/krb5_1.2.4-5woody6.dsc
stable/main/binary-alpha/krb5-admin-server_1.2.4-5woody6_alpha.deb
stable/main/binary-alpha/krb5-ftpd_1.2.4-5woody6_alpha.deb
stable/main/binary-alpha/krb5-user_1.2.4-5woody6_alpha.deb
stable/main/binary-alpha/libkrb5-dev_1.2.4-5woody6_alpha.deb
stable/main/binary-alpha/libkadm55_1.2.4-5woody6_alpha.deb
stable/main/binary-alpha/krb5-clients_1.2.4-5woody6_alpha.deb
stable/main/binary-alpha/libkrb53_1.2.4-5woody6_alpha.deb
stable/main/binary-alpha/krb5-kdc_1.2.4-5woody6_alpha.deb
stable/main/binary-alpha/krb5-telnetd_1.2.4-5woody6_alpha.deb
krb5 (1.2.4-5woody6) stable-security; urgency=high
  * KDC and clients double-free on error conditions (CAN-2004-0642)
  * krb5_rd_cred() double-frees on error conditions (CAN-2004-0643)
  * ASN.1 decoder in MIT Kerberos 5 releases krb5-1.3.4 and
    earlier allows unauthenticated remote attackers to induce
    infinite loop, causing denial of service, including in KDC
    code (CAN-2004-0644)
  * Update double free patch to include an additional rd_cred case


stable/main/binary-all/kernel-doc-2.4.19_2.4.19-4.woody2_all.deb
stable/main/source/kernel-source-2.4.19_2.4.19-4.woody2.diff.gz
stable/main/binary-all/kernel-source-2.4.19_2.4.19-4.woody2_all.deb
stable/main/source/kernel-source-2.4.19_2.4.19-4.woody2.dsc
kernel-source-2.4.19 (2.4.19-4.woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied ptrace bugfix by Alan Cox to fix local root exploit
    [http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0134.html,
    CAN-2003-0127]
  * Applied patch by Petr Vandrovec <vandrove@vc.cvut.cz> to fix a
    possible roothole in ncpfs discovered by Arjan van de Ven
    <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
  * Applied patch by Sebastian Krahmer <krahmer@suse.de> and Ernie
    Petrides <petrides@redhat.com> to fix a local root exploit in iso9660
    [fs/isofs/rock.c, CAN-2004-0109]
  * Applied patch by Alan Cox and Thomas Biege to fix local root exploit
    in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003,
    drivers/char/drm-4.0/r128_state.c]
  * Applied additional patch by Ernie Petrides <petrides@redhat.com> to
    fix another intance of the same
  * Applied patch by Theodore Ts'o <tytso@mit.edu> to fix an information
    leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177]
  * Applied patch by Andreas Kies <andikies@t-online.de> to fix local
    denial of service in the Sound Blaster driver
    [drivers/sound/sb_audio.c, CAN-2004-0178]


stable/main/binary-all/kernel-source-2.4.18_2.4.18-14.3_all.deb
stable/main/binary-all/kernel-doc-2.4.18_2.4.18-14.3_all.deb
stable/main/source/kernel-source-2.4.18_2.4.18-14.3.dsc
stable/main/source/kernel-source-2.4.18_2.4.18-14.3.diff.gz
kernel-source-2.4.18 (2.4.18-14.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Petr Vandrovec <vandrove@vc.cvut.cz> to fix a
    possible roothole in ncpfs discovered by Arjan van de Ven
    <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
  * Applied patch by Sebastian Krahmer <krahmer@suse.de> and Ernie
    Petrides <petrides@redhat.com> to fix a local root exploit in iso9660
    [fs/isofs/rock.c, CAN-2004-0109]
  * Applied patch by Alan Cox and Thomas Biege to fix local root exploit
    in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003,
    drivers/char/drm-4.0/r128_state.c]
  * Applied additional patch by Ernie Petrides <petrides@redhat.com> to
    fix another intance of the same
  * Applied patch by Theodore Ts'o <tytso@mit.edu> to fix an information
    leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177]
  * Applied patch by Andreas Kies <andikies@t-online.de> to fix local
    denial of service in the Sound Blaster driver
    [drivers/sound/sb_audio.c, CAN-2004-0178]


stable/main/binary-sparc/mkcramfs_2.4.17-1woody3_sparc.deb
kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Petr Vandrovec <vandrove@vc.cvut.cz> to fix a
    possible roothole in ncpfs discovered by Arjan van de Ven
    <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
  * Applied patch by Sebastian Krahmer <krahmer@suse.de> and Ernie
    Petrides <petrides@redhat.com> to fix a local root exploit in iso9660
    [fs/isofs/rock.c, CAN-2004-0109]
  * Applied patch by Alan Cox and Thomas Biege to fix local root exploit
    in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003]
  * Applied additional patch by Ernie Petrides <petrides@redhat.com> to
    fix another intance of the same
  * Applied patch by Theodore Ts'o <tytso@mit.edu> to fix an information
    leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177]
  * Applied patch by Andreas Kies <andikies@t-online.de> to fix local
    denial of service in the Sound Blaster driver
    [drivers/sound/sb_audio.c, CAN-2004-0178]


stable/main/binary-s390/mkcramfs_2.4.17-1woody3_s390.deb
kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Petr Vandrovec <vandrove@vc.cvut.cz> to fix a
    possible roothole in ncpfs discovered by Arjan van de Ven
    <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
  * Applied patch by Sebastian Krahmer <krahmer@suse.de> and Ernie
    Petrides <petrides@redhat.com> to fix a local root exploit in iso9660
    [fs/isofs/rock.c, CAN-2004-0109]
  * Applied patch by Alan Cox and Thomas Biege to fix local root exploit
    in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003]
  * Applied additional patch by Ernie Petrides <petrides@redhat.com> to
    fix another intance of the same
  * Applied patch by Theodore Ts'o <tytso@mit.edu> to fix an information
    leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177]
  * Applied patch by Andreas Kies <andikies@t-online.de> to fix local
    denial of service in the Sound Blaster driver
    [drivers/sound/sb_audio.c, CAN-2004-0178]


stable/main/binary-powerpc/mkcramfs_2.4.17-1woody3_powerpc.deb
kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Petr Vandrovec <vandrove@vc.cvut.cz> to fix a
    possible roothole in ncpfs discovered by Arjan van de Ven
    <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
  * Applied patch by Sebastian Krahmer <krahmer@suse.de> and Ernie
    Petrides <petrides@redhat.com> to fix a local root exploit in iso9660
    [fs/isofs/rock.c, CAN-2004-0109]
  * Applied patch by Alan Cox and Thomas Biege to fix local root exploit
    in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003]
  * Applied additional patch by Ernie Petrides <petrides@redhat.com> to
    fix another intance of the same
  * Applied patch by Theodore Ts'o <tytso@mit.edu> to fix an information
    leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177]
  * Applied patch by Andreas Kies <andikies@t-online.de> to fix local
    denial of service in the Sound Blaster driver
    [drivers/sound/sb_audio.c, CAN-2004-0178]


stable/main/binary-mipsel/mkcramfs_2.4.17-1woody3_mipsel.deb
kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Petr Vandrovec <vandrove@vc.cvut.cz> to fix a
    possible roothole in ncpfs discovered by Arjan van de Ven
    <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
  * Applied patch by Sebastian Krahmer <krahmer@suse.de> and Ernie
    Petrides <petrides@redhat.com> to fix a local root exploit in iso9660
    [fs/isofs/rock.c, CAN-2004-0109]
  * Applied patch by Alan Cox and Thomas Biege to fix local root exploit
    in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003]
  * Applied additional patch by Ernie Petrides <petrides@redhat.com> to
    fix another intance of the same
  * Applied patch by Theodore Ts'o <tytso@mit.edu> to fix an information
    leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177]
  * Applied patch by Andreas Kies <andikies@t-online.de> to fix local
    denial of service in the Sound Blaster driver
    [drivers/sound/sb_audio.c, CAN-2004-0178]


stable/main/binary-mips/mkcramfs_2.4.17-1woody3_mips.deb
kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Petr Vandrovec <vandrove@vc.cvut.cz> to fix a
    possible roothole in ncpfs discovered by Arjan van de Ven
    <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
  * Applied patch by Sebastian Krahmer <krahmer@suse.de> and Ernie
    Petrides <petrides@redhat.com> to fix a local root exploit in iso9660
    [fs/isofs/rock.c, CAN-2004-0109]
  * Applied patch by Alan Cox and Thomas Biege to fix local root exploit
    in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003]
  * Applied additional patch by Ernie Petrides <petrides@redhat.com> to
    fix another intance of the same
  * Applied patch by Theodore Ts'o <tytso@mit.edu> to fix an information
    leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177]
  * Applied patch by Andreas Kies <andikies@t-online.de> to fix local
    denial of service in the Sound Blaster driver
    [drivers/sound/sb_audio.c, CAN-2004-0178]


stable/main/binary-m68k/mkcramfs_2.4.17-1woody3_m68k.deb
kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Petr Vandrovec <vandrove@vc.cvut.cz> to fix a
    possible roothole in ncpfs discovered by Arjan van de Ven
    <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
  * Applied patch by Sebastian Krahmer <krahmer@suse.de> and Ernie
    Petrides <petrides@redhat.com> to fix a local root exploit in iso9660
    [fs/isofs/rock.c, CAN-2004-0109]
  * Applied patch by Alan Cox and Thomas Biege to fix local root exploit
    in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003]
  * Applied additional patch by Ernie Petrides <petrides@redhat.com> to
    fix another intance of the same
  * Applied patch by Theodore Ts'o <tytso@mit.edu> to fix an information
    leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177]
  * Applied patch by Andreas Kies <andikies@t-online.de> to fix local
    denial of service in the Sound Blaster driver
    [drivers/sound/sb_audio.c, CAN-2004-0178]


stable/main/binary-ia64/mkcramfs_2.4.17-1woody3_ia64.deb
kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Petr Vandrovec <vandrove@vc.cvut.cz> to fix a
    possible roothole in ncpfs discovered by Arjan van de Ven
    <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
  * Applied patch by Sebastian Krahmer <krahmer@suse.de> and Ernie
    Petrides <petrides@redhat.com> to fix a local root exploit in iso9660
    [fs/isofs/rock.c, CAN-2004-0109]
  * Applied patch by Alan Cox and Thomas Biege to fix local root exploit
    in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003]
  * Applied additional patch by Ernie Petrides <petrides@redhat.com> to
    fix another intance of the same
  * Applied patch by Theodore Ts'o <tytso@mit.edu> to fix an information
    leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177]
  * Applied patch by Andreas Kies <andikies@t-online.de> to fix local
    denial of service in the Sound Blaster driver
    [drivers/sound/sb_audio.c, CAN-2004-0178]


stable/main/binary-hppa/mkcramfs_2.4.17-1woody3_hppa.deb
kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Petr Vandrovec <vandrove@vc.cvut.cz> to fix a
    possible roothole in ncpfs discovered by Arjan van de Ven
    <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
  * Applied patch by Sebastian Krahmer <krahmer@suse.de> and Ernie
    Petrides <petrides@redhat.com> to fix a local root exploit in iso9660
    [fs/isofs/rock.c, CAN-2004-0109]
  * Applied patch by Alan Cox and Thomas Biege to fix local root exploit
    in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003]
  * Applied additional patch by Ernie Petrides <petrides@redhat.com> to
    fix another intance of the same
  * Applied patch by Theodore Ts'o <tytso@mit.edu> to fix an information
    leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177]
  * Applied patch by Andreas Kies <andikies@t-online.de> to fix local
    denial of service in the Sound Blaster driver
    [drivers/sound/sb_audio.c, CAN-2004-0178]


stable/main/binary-arm/mkcramfs_2.4.17-1woody3_arm.deb
kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Petr Vandrovec <vandrove@vc.cvut.cz> to fix a
    possible roothole in ncpfs discovered by Arjan van de Ven
    <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
  * Applied patch by Sebastian Krahmer <krahmer@suse.de> and Ernie
    Petrides <petrides@redhat.com> to fix a local root exploit in iso9660
    [fs/isofs/rock.c, CAN-2004-0109]
  * Applied patch by Alan Cox and Thomas Biege to fix local root exploit
    in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003]
  * Applied additional patch by Ernie Petrides <petrides@redhat.com> to
    fix another intance of the same
  * Applied patch by Theodore Ts'o <tytso@mit.edu> to fix an information
    leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177]
  * Applied patch by Andreas Kies <andikies@t-online.de> to fix local
    denial of service in the Sound Blaster driver
    [drivers/sound/sb_audio.c, CAN-2004-0178]


stable/main/binary-alpha/mkcramfs_2.4.17-1woody3_alpha.deb
kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Petr Vandrovec <vandrove@vc.cvut.cz> to fix a
    possible roothole in ncpfs discovered by Arjan van de Ven
    <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
  * Applied patch by Sebastian Krahmer <krahmer@suse.de> and Ernie
    Petrides <petrides@redhat.com> to fix a local root exploit in iso9660
    [fs/isofs/rock.c, CAN-2004-0109]
  * Applied patch by Alan Cox and Thomas Biege to fix local root exploit
    in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003]
  * Applied additional patch by Ernie Petrides <petrides@redhat.com> to
    fix another intance of the same
  * Applied patch by Theodore Ts'o <tytso@mit.edu> to fix an information
    leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177]
  * Applied patch by Andreas Kies <andikies@t-online.de> to fix local
    denial of service in the Sound Blaster driver
    [drivers/sound/sb_audio.c, CAN-2004-0178]


stable/main/binary-all/kernel-source-2.4.17_2.4.17-1woody3_all.deb
stable/main/source/kernel-source-2.4.17_2.4.17-1woody3.dsc
stable/main/binary-all/kernel-doc-2.4.17_2.4.17-1woody3_all.deb
stable/main/binary-i386/mkcramfs_2.4.17-1woody3_i386.deb
stable/main/source/kernel-source-2.4.17_2.4.17-1woody3.diff.gz
kernel-source-2.4.17 (2.4.17-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Petr Vandrovec <vandrove@vc.cvut.cz> to fix a
    possible roothole in ncpfs discovered by Arjan van de Ven
    <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
  * Applied patch by Sebastian Krahmer <krahmer@suse.de> and Ernie
    Petrides <petrides@redhat.com> to fix a local root exploit in iso9660
    [fs/isofs/rock.c, CAN-2004-0109]
  * Applied patch by Alan Cox and Thomas Biege to fix local root exploit
    in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003]
  * Applied additional patch by Ernie Petrides <petrides@redhat.com> to
    fix another intance of the same
  * Applied patch by Theodore Ts'o <tytso@mit.edu> to fix an information
    leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177]
  * Applied patch by Andreas Kies <andikies@t-online.de> to fix local
    denial of service in the Sound Blaster driver
    [drivers/sound/sb_audio.c, CAN-2004-0178]


stable/main/source/kernel-source-2.4.16_2.4.16-1woody2.diff.gz
stable/main/binary-all/kernel-source-2.4.16_2.4.16-1woody2_all.deb
stable/main/binary-all/kernel-doc-2.4.16_2.4.16-1woody2_all.deb
stable/main/source/kernel-source-2.4.16_2.4.16-1woody2.dsc
kernel-source-2.4.16 (2.4.16-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Alan Cox and Thomas Biege to fix local root exploit
    in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003]
  * Applied additional patch by Ernie Petrides <petrides@redhat.com> to
    fix another intance of the same
  * Applied patch by Petr Vandrovec <vandrove@vc.cvut.cz> to fix a
    possible roothole in ncpfs discovered by Arjan van de Ven
    <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
  * Applied patch extracted from Solar Designer's Owl patched kernel to
    fix local privilege escalation discovered by Paul Starzetz
    (CAN-2004-0077)
  * Applied patch by Andrea Arcangeli to fix local privilege escalation
    discovered by Paul Starzetz (CAN-2003-0985)
  * Added TASK_SIZE check to do_brk() [mm/mmap.c, CAN-2003-0961]
  * Applied patch by Sebastian Krahmer <krahmer@suse.de> and Ernie
    Petrides <petrides@redhat.com> to fix a local root exploit in iso9660
    [fs/isofs/rock.c, CAN-2004-0109]
  * Applied ptrace bugfix by Alan Cox to fix local root exploit
    [http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0134.html,
    CAN-2003-0127]
  * Applied patch by Theodore Ts'o <tytso@mit.edu> to fix an information
    leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177]
  * Applied patch by Andreas Kies <andikies@t-online.de> to fix local
    denial of service in the Sound Blaster driver
    [drivers/sound/sb_audio.c, CAN-2004-0178]
  * Removed mkcramfs binary package since it is superseded by 2.4.17
    (built from kernel-source-2.4.17), because this would cause a katie
    reject otherwise.


stable/main/binary-all/kernel-doc-2.2.22_2.2.22-1woody1_all.deb
stable/main/binary-all/kernel-source-2.2.22_2.2.22-1woody1_all.deb
stable/main/source/kernel-source-2.2.22_2.2.22-1woody1.dsc
stable/main/source/kernel-source-2.2.22_2.2.22-1woody1.diff.gz
kernel-source-2.2.22 (2.2.22-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch extracted from upstream 2.2.26 to fix local privilege
    escalation discovered by Paul Starzetz (CAN-2004-0077)


stable/main/binary-all/kernel-source-2.2.20_2.2.20-5woody3_all.deb
stable/main/source/kernel-source-2.2.20_2.2.20-5woody3.dsc
stable/main/source/kernel-source-2.2.20_2.2.20-5woody3.diff.gz
stable/main/binary-all/kernel-doc-2.2.20_2.2.20-5woody3_all.deb
kernel-source-2.2.20 (2.2.20-5woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch extracted from upstream 2.2.26 to fix local privilege
    escalation discovered by Paul Starzetz (CAN-2004-0077)


stable/main/source/kernel-source-2.2.19_2.2.19.1-4woody1.diff.gz
stable/main/source/kernel-source-2.2.19_2.2.19.1-4woody1.dsc
stable/main/binary-all/kernel-doc-2.2.19_2.2.19.1-4woody1_all.deb
stable/main/binary-all/kernel-source-2.2.19_2.2.19.1-4woody1_all.deb
stable/main/source/kernel-source-2.2.19_2.2.19.1.orig.tar.gz
kernel-source-2.2.19 (2.2.19.1-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch extracted from upstream 2.2.26 to fix local privilege
    escalation discovered by Paul Starzetz (CAN-2004-0077)
  * Re-introduced into the Debian archive


stable/main/binary-all/kernel-source-2.2.10_2.2.10-2_all.deb
stable/main/source/kernel-source-2.2.10_2.2.10.orig.tar.gz
stable/main/source/kernel-source-2.2.10_2.2.10-2.dsc
stable/main/source/kernel-source-2.2.10_2.2.10-2.diff.gz
stable/main/binary-all/kernel-doc-2.2.10_2.2.10-2_all.deb
kernel-source-2.2.10 (2.2.10-2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Resurrected the source package from an old potato source CD *cough*
  * Removed kernel-image-2.2.10 and kernel-headers-2.2.10
  * Imported debian/rules from 2.2.19 since the old version wasn't working
    (no makefile but called with make -f inside of the build target)
  * Applied patch extracted from upstream 2.2.26 to fix local privilege
    escalation discovered by Paul Starzetz [mm/mremap.c, CAN-2004-0077]


stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody4.tar.gz
stable/main/binary-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody4_mips.deb
stable/main/binary-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody4_mips.deb
stable/main/binary-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody4_mips.deb
stable/main/binary-mips/mips-tools_2.4.19-0.020911.1.woody4_mips.deb
stable/main/binary-all/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody4_all.deb
stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody4.dsc
kernel-patch-2.4.19-mips (2.4.19-0.020911.1.woody4) stable-security; urgency=low
  * Rebuild against kernel-source-2.4.19_2.4.19-4.woody2 to fix
    - a possible roothole in ncpfs discovered by Arjan van de Ven
      <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
    - a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109]
    - a local root exploit in the R128 DRI code
      [drivers/char/drm/r128_state.c, CAN-2004-0003]
    - an information leak in ext3 journal creation
      [fs/jbd/journal.c, CAN-2004-0177]
    - a local denial of service in the Sound Blaster driver
      [drivers/sound/sb_audio.c, CAN-2004-0178]
  * Added versioned build-dependency on kernel-source >= 2.4.19-4.woody2


stable/main/binary-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody6_mips.deb
stable/main/binary-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody6_mips.deb
stable/main/binary-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody6_mips.deb
kernel-patch-2.4.17-mips (2.4.17-0.020226.2.woody6) stable-security; urgency=low
  * Rebuild against kernel-source-2.4.17_2.4.17-1woody3 to fix
    - a possible roothole in ncpfs discovered by Arjan van de Ven
      <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
    - a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109]
    - a local root exploit in the R128 DRI code
      [drivers/char/drm/r128_state.c, CAN-2004-0003]
    - an information leak in ext3 journal creation
      [fs/jbd/journal.c, CAN-2004-0177]
    - a local denial of service in the Sound Blaster driver
      [drivers/sound/sb_audio.c, CAN-2004-0178]
  * Added versioned build-dependency on kernel-source >= 2.4.17-1woody3


stable/main/binary-all/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody6_all.deb
stable/main/binary-mipsel/kernel-headers-2.4.17_2.4.17-0.020226.2.woody6_mipsel.deb
stable/main/binary-mipsel/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody6_mipsel.deb
stable/main/binary-mipsel/mips-tools_2.4.17-0.020226.2.woody6_mipsel.deb
stable/main/source/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody6.dsc
stable/main/source/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody6.tar.gz
stable/main/binary-mipsel/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody6_mipsel.deb
kernel-patch-2.4.17-mips (2.4.17-0.020226.2.woody6) stable-security; urgency=low
  * Rebuild against kernel-source-2.4.17_2.4.17-1woody3 to fix
    - a possible roothole in ncpfs discovered by Arjan van de Ven
      <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
    - a local root exploit in iso9660 [fs/isofs/rock.c, CAN-2004-0109]
    - a local root exploit in the R128 DRI code
      [drivers/char/drm/r128_state.c, CAN-2004-0003]
    - an information leak in ext3 journal creation
      [fs/jbd/journal.c, CAN-2004-0177]
    - a local denial of service in the Sound Blaster driver
      [drivers/sound/sb_audio.c, CAN-2004-0178]
  * Added versioned build-dependency on kernel-source >= 2.4.17-1woody3


stable/main/source/kernel-patch-2.4.17-apus_2.4.17-5.dsc
stable/main/binary-powerpc/kernel-headers-2.4.17-apus_2.4.17-5_powerpc.deb
stable/main/binary-powerpc/kernel-patch-2.4.17-apus_2.4.17-5_powerpc.deb
stable/main/binary-powerpc/kernel-image-apus_2.4.17-5_powerpc.deb
stable/main/binary-powerpc/kernel-image-2.4.17-apus_2.4.17-5_powerpc.deb
stable/main/source/kernel-patch-2.4.17-apus_2.4.17-5.tar.gz
kernel-patch-2.4.17-apus (2.4.17-5) stable-security; urgency=low
  * Build-depens on kernel-source-2.4.17 2.4.17-1woody2, to pick up :
    - Applied patch by Petr Vandrovec <vandrove@vc.cvut.cz> to fix a
      possible roothole in ncpfs discovered by Arjan van de Ven
      <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
    - Applied patch by Sebastian Krahmer <krahmer@suse.de> and Ernie
      Petrides <petrides@redhat.com> to fix a local root exploit in iso9660
      [fs/isofs/rock.c, CAN-2004-0109]
    - Applied patch by Alan Cox and Thomas Biege to fix local root exploit
      in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003]
    - Applied additional patch by Ernie Petrides <petrides@redhat.com> to
      fix another intance of the same
    - Applied patch by Theodore Ts'o <tytso@mit.edu> to fix an information
      leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177]
    - Applied patch by Andreas Kies <andikies@t-online.de> to fix local
      denial of service in the Sound Blaster driver
      [drivers/sound/sb_audio.c, CAN-2004-0178]


stable/main/source/kernel-patch-2.4.16-arm_20040419.tar.gz
stable/main/source/kernel-patch-2.4.16-arm_20040419.dsc
stable/main/binary-all/kernel-patch-2.4.16-arm_20040419_all.deb
kernel-patch-2.4.16-arm (20040419) stable-security; urgency=medium
  * Remove mmap/mremap security patches now included in main
    kernel-source package.
  * Add patch for mkdep over-long command lines.
  * Add fix for undefined "unlikely()" in mm/mremap.c


stable/main/binary-powerpc/kernel-headers-2.2.20_2.2.20-3woody1_powerpc.deb
stable/main/binary-powerpc/kernel-image-2.2.20-pmac_2.2.20-3woody1_powerpc.deb
stable/main/source/kernel-patch-2.2.20-powerpc_2.2.20-3woody1.tar.gz
stable/main/binary-powerpc/kernel-image-2.2.20-chrp_2.2.20-3woody1_powerpc.deb
stable/main/binary-all/kernel-patch-2.2.20-powerpc_2.2.20-3woody1_all.deb
stable/main/binary-powerpc/kernel-image-2.2.20-prep_2.2.20-3woody1_powerpc.deb
stable/main/source/kernel-patch-2.2.20-powerpc_2.2.20-3woody1.dsc
kernel-patch-2.2.20-powerpc (2.2.20-3woody1) stable-security; urgency=high
  * Rebuild against kernel-source-2.2.20 2.2.20-5woody3 to pull in
    the patch extracted from upstream 2.2.26 to fix local privilege
    escalation discovered by Paul Starzetz (CAN-2004-0077)


stable/main/binary-all/kernel-patch-2.2.19-arm_20040303_all.deb
stable/main/source/kernel-patch-2.2.19-arm_20040303.dsc
stable/main/source/kernel-patch-2.2.19-arm_20040303.tar.gz
kernel-patch-2.2.19-arm (20040303) stable-security; urgency=high
  * Resolve patch conflict with latest kernel-source-2.2.19.


stable/main/binary-sparc/kernel-image-2.2.20-sun4dm-smp_9woody1_sparc.deb
stable/main/binary-all/kernel-headers-2.2.20-sparc_9woody1_all.deb
stable/main/source/kernel-image-sparc-2.2_9woody1.dsc
stable/main/binary-sparc/kernel-image-2.2.20-sun4cdm_9woody1_sparc.deb
stable/main/binary-sparc/kernel-image-2.2.20-sun4u-smp_9woody1_sparc.deb
stable/main/source/kernel-image-sparc-2.2_9woody1.tar.gz
stable/main/binary-sparc/kernel-image-2.2.20-sun4u_9woody1_sparc.deb
kernel-image-sparc-2.2 (9woody1) stable-security; urgency=HIGH
  * NMU for security
  * Security update pulled in by adding versioned dependency
    on kernel-source-2.2.20 (2.2.20-5woody3):
      - CAN-2004-0077: Linux kernel do_mremap VMA limit local privilege
        escalation vulnerability (Closes: #238709)
  * Fix FTBFS: add debhelper and kernel-package to Build-Depends, and
    change tar Ixf usage to tar --bzip2 -xf
  * patches/all/sparc64-NEW_GAS-check: use ld -V, not ld --version, so
    as to work around incorrect use of sparc64-linux-ld


stable/main/binary-hppa/kernel-image-2.4.18-32_62.3_hppa.deb
stable/main/binary-hppa/kernel-image-2.4.18-64_62.3_hppa.deb
stable/main/binary-hppa/kernel-headers-2.4.18-hppa_62.3_hppa.deb
stable/main/source/kernel-image-2.4.18-hppa_62.3.dsc
stable/main/binary-hppa/kernel-image-2.4.18-64-smp_62.3_hppa.deb
stable/main/source/kernel-image-2.4.18-hppa_62.3.tar.gz
stable/main/binary-all/kernel-source-2.4.18-hppa_62.3_all.deb
stable/main/binary-hppa/kernel-image-2.4.18-32-smp_62.3_hppa.deb
kernel-image-2.4.18-hppa (62.3) stable-security; urgency=high
  * Fixes for CAN-2004-0003, CAN-2004-0010, CAN-2004-0109, CAN-2004-0177,
    CAN-2004-0178.


stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.4.dsc
stable/main/binary-s390/kernel-headers-2.4.17_2.4.17-2.woody.4_s390.deb
stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.4.tar.gz
stable/main/binary-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.4_s390.deb
kernel-image-2.4.17-s390 (2.4.17-2.woody.4) stable-security; urgency=high
  * Rebuild against latest kernel-patch-2.4.17-s390_0.0.20020816-0.woody.3,
    which includes the follwing additional security fixes:
    - Applied patch by Petr Vandrovec <vandrove@vc.cvut.cz> to fix a
      possible roothole in ncpfs discovered by Arjan van de Ven
      <arjanv@devserv.devel.redhat.com> [fs/ncpfs/dir.c, CAN-2004-0010]
    - Applied patch by Sebastian Krahmer <krahmer@suse.de> and Ernie
      Petrides <petrides@redhat.com> to fix a local root exploit in iso9660
      [fs/isofs/rock.c, CAN-2004-0109]
    - Applied patch by Alan Cox and Thomas Biege to fix local root exploit
      in the R128 DRI code [drivers/char/drm/r128_state.c, CAN-2004-0003]
    - Applied additional patch by Ernie Petrides <petrides@redhat.com> to
      fix another intance of the same
    - Applied patch by Theodore Ts'o <tytso@mit.edu> to fix an information
      leak in ext3 journal creation [fs/jbd/journal.c, CAN-2004-0177]
    - Applied patch by Andreas Kies <andikies@t-online.de> to fix local
      denial of service in the Sound Blaster driver
      [drivers/sound/sb_audio.c, CAN-2004-0178]


stable/main/source/kernel-image-2.4.17-ia64_011226.17.dsc
stable/main/binary-ia64/kernel-image-2.4.17-itanium_011226.17_ia64.deb
stable/main/binary-ia64/kernel-image-2.4.17-mckinley-smp_011226.17_ia64.deb
stable/main/binary-all/kernel-source-2.4.17-ia64_011226.17_all.deb
stable/main/binary-ia64/kernel-headers-2.4.17-ia64_011226.17_ia64.deb
stable/main/source/kernel-image-2.4.17-ia64_011226.17.tar.gz
stable/main/binary-ia64/kernel-image-2.4.17-mckinley_011226.17_ia64.deb
stable/main/binary-ia64/kernel-image-2.4.17-itanium-smp_011226.17_ia64.deb
kernel-image-2.4.17-ia64 (011226.17) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch for CAN-2004-0003 (potential local root exploit in r128)
  * Apply patch for CAN-2004-0010 (potential local root exploit in ncpfs)
  * Apply patch for CAN-2004-0109 (potential local root exploit in isofs)
  * Apply patch for CAN-2004-0177 (information leak in ext3)
  * Apply patch for CAN-2004-0178 (DoS in sound)


stable/main/source/kernel-image-2.4.17-hppa_32.4.dsc
stable/main/source/kernel-image-2.4.17-hppa_32.4.tar.gz
stable/main/binary-hppa/kernel-image-2.4.17-64_32.4_hppa.deb
stable/main/binary-hppa/kernel-image-2.4.17-32-smp_32.4_hppa.deb
stable/main/binary-hppa/kernel-headers-2.4.17-hppa_32.4_hppa.deb
stable/main/binary-hppa/kernel-image-2.4.17-32_32.4_hppa.deb
stable/main/binary-hppa/kernel-image-2.4.17-64-smp_32.4_hppa.deb
stable/main/binary-all/kernel-source-2.4.17-hppa_32.4_all.deb
kernel-image-2.4.17-hppa (32.4) stable-security; urgency=high
  * Fixes for CAN-2004-0003, CAN-2004-0010, CAN-2004-0109, CAN-2004-0177,
    CAN-2004-0178.


stable/main/binary-arm/kernel-image-2.4.16-riscpc_20040419_arm.deb
stable/main/source/kernel-image-2.4.16-riscpc_20040419.dsc
stable/main/source/kernel-image-2.4.16-riscpc_20040419.tar.gz
kernel-image-2.4.16-riscpc (20040419) stable-security; urgency=high
  * Rebuild with updated kernel-source-2.4.16 to incorporate
    fix for CAN-2004-0109.


stable/main/binary-arm/kernel-image-2.4.16-netwinder_20040419_arm.deb
stable/main/source/kernel-image-2.4.16-netwinder_20040419.tar.gz
stable/main/binary-arm/kernel-headers-2.4.16_20040419_arm.deb
stable/main/source/kernel-image-2.4.16-netwinder_20040419.dsc
kernel-image-2.4.16-netwinder (20040419) stable-security; urgency=medium
  * Rebuild with updated kernel-source-2.4.16 to incorporate
    fix for CAN-2004-0109.


stable/main/source/kernel-image-2.4.16-lart_20040419.dsc
stable/main/binary-arm/kernel-image-2.4.16-lart_20040419_arm.deb
stable/main/source/kernel-image-2.4.16-lart_20040419.tar.gz
kernel-image-2.4.16-lart (20040419) stable-security; urgency=medium
  * Rebuild with updated kernel-source-2.4.16 to incorporate
    fix for CAN-2004-0109.


stable/main/binary-alpha/kernel-image-2.2.22-jensen_2.2.22-2_alpha.deb
stable/main/binary-alpha/kernel-image-2.2.22-generic_2.2.22-2_alpha.deb
stable/main/source/kernel-image-2.2.22-alpha_2.2.22-2.tar.gz
stable/main/binary-alpha/kernel-image-2.2.22-smp_2.2.22-2_alpha.deb
stable/main/binary-alpha/kernel-image-2.2.22-nautilus_2.2.22-2_alpha.deb
stable/main/binary-alpha/kernel-headers-2.2.22_2.2.22-2_alpha.deb
stable/main/source/kernel-image-2.2.22-alpha_2.2.22-2.dsc
kernel-image-2.2.22-alpha (2.2.22-2) stable-security; urgency=high
  * Built against kernel-source 2.2.22-1woody1.


stable/main/source/kernel-image-2.2.20-mvme16x_2.2.20-3.tar.gz
stable/main/binary-m68k/kernel-image-2.2.20-mvme16x_2.2.20-3_m68k.deb
stable/main/source/kernel-image-2.2.20-mvme16x_2.2.20-3.dsc
kernel-image-2.2.20-mvme16x (2.2.20-3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch extracted from upstream 2.2.26 to fix local privilege
    escalation discovered by Paul Starzetz (CAN-2004-0077)


stable/main/source/kernel-image-2.2.20-mvme147_2.2.20-3.dsc
stable/main/source/kernel-image-2.2.20-mvme147_2.2.20-3.tar.gz
stable/main/binary-m68k/kernel-image-2.2.20-mvme147_2.2.20-3_m68k.deb
kernel-image-2.2.20-mvme147 (2.2.20-3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch extracted from upstream 2.2.26 to fix local privilege
    escalation discovered by Paul Starzetz (CAN-2004-0077)


stable/main/source/kernel-image-2.2.20-mac_2.2.20-3.dsc
stable/main/source/kernel-image-2.2.20-mac_2.2.20-3.tar.gz
stable/main/binary-m68k/kernel-image-2.2.20-mac_2.2.20-3_m68k.deb
kernel-image-2.2.20-mac (2.2.20-3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch extracted from upstream 2.2.26 to fix local privilege
    escalation discovered by Paul Starzetz (CAN-2004-0077)


stable/main/source/kernel-image-2.2.20-i386_2.2.20-5woody5.tar.gz
stable/main/binary-i386/kernel-headers-2.2.20_2.2.20-5woody5_i386.deb
stable/main/binary-i386/kernel-headers-2.2.20-compact_2.2.20-5woody5_i386.deb
stable/main/binary-i386/kernel-image-2.2.20-idepci_2.2.20-5woody5_i386.deb
stable/main/binary-i386/kernel-image-2.2.20-compact_2.2.20-5woody5_i386.deb
stable/main/source/kernel-image-2.2.20-i386_2.2.20-5woody5.dsc
stable/main/binary-i386/kernel-image-2.2.20_2.2.20-5woody5_i386.deb
stable/main/binary-i386/kernel-headers-2.2.20-idepci_2.2.20-5woody5_i386.deb
kernel-image-2.2.20-i386 (2.2.20-5woody5) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Built against kernel-source-2.2.20 2.2.20-5woody3 to include the patch
    extracted from upstream 2.2.26 to fix local privilege escalation
    discovered by Paul Starzetz (CAN-2004-0077)
  * Removed dependency and support for modules-scyld-source-0.1 since it
    doesn't build anymore anyway.
  * This effectively removes all *-scyld.o modules


stable/main/binary-m68k/kernel-image-2.2.20-bvme6000_2.2.20-3_m68k.deb
stable/main/source/kernel-image-2.2.20-bvme6000_2.2.20-3.dsc
stable/main/source/kernel-image-2.2.20-bvme6000_2.2.20-3.tar.gz
kernel-image-2.2.20-bvme6000 (2.2.20-3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch extracted from upstream 2.2.26 to fix local privilege
    escalation discovered by Paul Starzetz (CAN-2004-0077)


stable/main/source/kernel-image-2.2.20-atari_2.2.20-3.tar.gz
stable/main/source/kernel-image-2.2.20-atari_2.2.20-3.dsc
stable/main/binary-m68k/kernel-image-2.2.20-atari_2.2.20-3_m68k.deb
kernel-image-2.2.20-atari (2.2.20-3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch extracted from upstream 2.2.26 to fix local privilege
    escalation discovered by Paul Starzetz (CAN-2004-0077)


stable/main/source/kernel-image-2.2.20-amiga_2.2.20-4.dsc
stable/main/source/kernel-image-2.2.20-amiga_2.2.20-4.tar.gz
stable/main/binary-m68k/kernel-image-2.2.20-amiga_2.2.20-4_m68k.deb
kernel-image-2.2.20-amiga (2.2.20-4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch extracted from upstream 2.2.26 to fix local privilege
    escalation discovered by Paul Starzetz (CAN-2004-0077)


stable/main/source/kernel-image-2.2.19-riscpc_20040303.dsc
stable/main/binary-arm/kernel-image-2.2.19-riscpc_20040303_arm.deb
stable/main/source/kernel-image-2.2.19-riscpc_20040303.tar.gz
kernel-image-2.2.19-riscpc (20040303) stable-security; urgency=high
  * Recompile against kernel-source 2.2.19.1-4woody1 to incorporate
    patch for CAN-2004-0077.


stable/main/source/kernel-image-2.2.19-netwinder_20040303.dsc
stable/main/binary-arm/kernel-image-2.2.19-netwinder_20040303_arm.deb
stable/main/source/kernel-image-2.2.19-netwinder_20040303.tar.gz
stable/main/binary-arm/kernel-headers-2.2.19_20040303_arm.deb
kernel-image-2.2.19-netwinder (20040303) stable-security; urgency=high
  * Recompile against kernel-source 2.2.19.1-4woody1 to incorporate
    patch for CAN-2004-0077.


stable/main/binary-sparc/klprfax_2.2.2-9.2_sparc.deb
stable/main/binary-sparc/kpm_2.2.2-9.2_sparc.deb
stable/main/binary-sparc/kdf_2.2.2-9.2_sparc.deb
stable/main/binary-sparc/klpq_2.2.2-9.2_sparc.deb
stable/main/binary-sparc/kfind_2.2.2-9.2_sparc.deb
stable/main/binary-sparc/khexedit_2.2.2-9.2_sparc.deb
stable/main/binary-sparc/kcalc_2.2.2-9.2_sparc.deb
stable/main/binary-sparc/knotes_2.2.2-9.2_sparc.deb
stable/main/binary-sparc/karm_2.2.2-9.2_sparc.deb
stable/main/binary-sparc/ktimer_2.2.2-9.2_sparc.deb
stable/main/binary-sparc/kab_2.2.2-9.2_sparc.deb
stable/main/binary-sparc/kfloppy_2.2.2-9.2_sparc.deb
stable/main/binary-sparc/ark_2.2.2-9.2_sparc.deb
stable/main/binary-sparc/kljettool_2.2.2-9.2_sparc.deb
stable/main/binary-sparc/kjots_2.2.2-9.2_sparc.deb
stable/main/binary-sparc/kedit_2.2.2-9.2_sparc.deb
stable/main/binary-sparc/kdepasswd_2.2.2-9.2_sparc.deb
stable/main/binary-sparc/kcharselect_2.2.2-9.2_sparc.deb
stable/main/binary-sparc/klaptopdaemon_2.2.2-9.2_sparc.deb
kdeutils (4:2.2.2-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-s390/kcharselect_2.2.2-9.2_s390.deb
stable/main/binary-s390/kcalc_2.2.2-9.2_s390.deb
stable/main/binary-s390/kjots_2.2.2-9.2_s390.deb
stable/main/binary-s390/kab_2.2.2-9.2_s390.deb
stable/main/binary-s390/kfloppy_2.2.2-9.2_s390.deb
stable/main/binary-s390/kljettool_2.2.2-9.2_s390.deb
stable/main/binary-s390/ark_2.2.2-9.2_s390.deb
stable/main/binary-s390/kpm_2.2.2-9.2_s390.deb
stable/main/binary-s390/knotes_2.2.2-9.2_s390.deb
stable/main/binary-s390/kfind_2.2.2-9.2_s390.deb
stable/main/binary-s390/klaptopdaemon_2.2.2-9.2_s390.deb
stable/main/binary-s390/kdepasswd_2.2.2-9.2_s390.deb
stable/main/binary-s390/klpq_2.2.2-9.2_s390.deb
stable/main/binary-s390/kdf_2.2.2-9.2_s390.deb
stable/main/binary-s390/karm_2.2.2-9.2_s390.deb
stable/main/binary-s390/khexedit_2.2.2-9.2_s390.deb
stable/main/binary-s390/kedit_2.2.2-9.2_s390.deb
stable/main/binary-s390/ktimer_2.2.2-9.2_s390.deb
stable/main/binary-s390/klprfax_2.2.2-9.2_s390.deb
kdeutils (4:2.2.2-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-powerpc/kedit_2.2.2-9.2_powerpc.deb
stable/main/binary-powerpc/ark_2.2.2-9.2_powerpc.deb
stable/main/binary-powerpc/kdf_2.2.2-9.2_powerpc.deb
stable/main/binary-powerpc/kjots_2.2.2-9.2_powerpc.deb
stable/main/binary-powerpc/khexedit_2.2.2-9.2_powerpc.deb
stable/main/binary-powerpc/ktimer_2.2.2-9.2_powerpc.deb
stable/main/binary-powerpc/klpq_2.2.2-9.2_powerpc.deb
stable/main/binary-powerpc/kfloppy_2.2.2-9.2_powerpc.deb
stable/main/binary-powerpc/kpm_2.2.2-9.2_powerpc.deb
stable/main/binary-powerpc/kfind_2.2.2-9.2_powerpc.deb
stable/main/binary-powerpc/kdepasswd_2.2.2-9.2_powerpc.deb
stable/main/binary-powerpc/kljettool_2.2.2-9.2_powerpc.deb
stable/main/binary-powerpc/kcharselect_2.2.2-9.2_powerpc.deb
stable/main/binary-powerpc/klaptopdaemon_2.2.2-9.2_powerpc.deb
stable/main/binary-powerpc/knotes_2.2.2-9.2_powerpc.deb
stable/main/binary-powerpc/kab_2.2.2-9.2_powerpc.deb
stable/main/binary-powerpc/kcalc_2.2.2-9.2_powerpc.deb
stable/main/binary-powerpc/klprfax_2.2.2-9.2_powerpc.deb
stable/main/binary-powerpc/karm_2.2.2-9.2_powerpc.deb
kdeutils (4:2.2.2-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mipsel/kfloppy_2.2.2-9.2_mipsel.deb
stable/main/binary-mipsel/klprfax_2.2.2-9.2_mipsel.deb
stable/main/binary-mipsel/kpm_2.2.2-9.2_mipsel.deb
stable/main/binary-mipsel/kab_2.2.2-9.2_mipsel.deb
stable/main/binary-mipsel/kdf_2.2.2-9.2_mipsel.deb
stable/main/binary-mipsel/kjots_2.2.2-9.2_mipsel.deb
stable/main/binary-mipsel/kcalc_2.2.2-9.2_mipsel.deb
stable/main/binary-mipsel/khexedit_2.2.2-9.2_mipsel.deb
stable/main/binary-mipsel/kljettool_2.2.2-9.2_mipsel.deb
stable/main/binary-mipsel/klaptopdaemon_2.2.2-9.2_mipsel.deb
stable/main/binary-mipsel/karm_2.2.2-9.2_mipsel.deb
stable/main/binary-mipsel/knotes_2.2.2-9.2_mipsel.deb
stable/main/binary-mipsel/kdepasswd_2.2.2-9.2_mipsel.deb
stable/main/binary-mipsel/ktimer_2.2.2-9.2_mipsel.deb
stable/main/binary-mipsel/kfind_2.2.2-9.2_mipsel.deb
stable/main/binary-mipsel/klpq_2.2.2-9.2_mipsel.deb
stable/main/binary-mipsel/kcharselect_2.2.2-9.2_mipsel.deb
stable/main/binary-mipsel/kedit_2.2.2-9.2_mipsel.deb
stable/main/binary-mipsel/ark_2.2.2-9.2_mipsel.deb
kdeutils (4:2.2.2-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mips/kljettool_2.2.2-9.2_mips.deb
stable/main/binary-mips/kcharselect_2.2.2-9.2_mips.deb
stable/main/binary-mips/klaptopdaemon_2.2.2-9.2_mips.deb
stable/main/binary-mips/klpq_2.2.2-9.2_mips.deb
stable/main/binary-mips/kjots_2.2.2-9.2_mips.deb
stable/main/binary-mips/khexedit_2.2.2-9.2_mips.deb
stable/main/binary-mips/kcalc_2.2.2-9.2_mips.deb
stable/main/binary-mips/kedit_2.2.2-9.2_mips.deb
stable/main/binary-mips/kab_2.2.2-9.2_mips.deb
stable/main/binary-mips/ark_2.2.2-9.2_mips.deb
stable/main/binary-mips/kdepasswd_2.2.2-9.2_mips.deb
stable/main/binary-mips/knotes_2.2.2-9.2_mips.deb
stable/main/binary-mips/klprfax_2.2.2-9.2_mips.deb
stable/main/binary-mips/kfloppy_2.2.2-9.2_mips.deb
stable/main/binary-mips/kfind_2.2.2-9.2_mips.deb
stable/main/binary-mips/ktimer_2.2.2-9.2_mips.deb
stable/main/binary-mips/karm_2.2.2-9.2_mips.deb
stable/main/binary-mips/kpm_2.2.2-9.2_mips.deb
stable/main/binary-mips/kdf_2.2.2-9.2_mips.deb
kdeutils (4:2.2.2-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-m68k/ark_2.2.2-9.2_m68k.deb
stable/main/binary-m68k/kjots_2.2.2-9.2_m68k.deb
stable/main/binary-m68k/kljettool_2.2.2-9.2_m68k.deb
stable/main/binary-m68k/kedit_2.2.2-9.2_m68k.deb
stable/main/binary-m68k/kpm_2.2.2-9.2_m68k.deb
stable/main/binary-m68k/ktimer_2.2.2-9.2_m68k.deb
stable/main/binary-m68k/khexedit_2.2.2-9.2_m68k.deb
stable/main/binary-m68k/karm_2.2.2-9.2_m68k.deb
stable/main/binary-m68k/klpq_2.2.2-9.2_m68k.deb
stable/main/binary-m68k/kdf_2.2.2-9.2_m68k.deb
stable/main/binary-m68k/kcalc_2.2.2-9.2_m68k.deb
stable/main/binary-m68k/klprfax_2.2.2-9.2_m68k.deb
stable/main/binary-m68k/kfloppy_2.2.2-9.2_m68k.deb
stable/main/binary-m68k/kcharselect_2.2.2-9.2_m68k.deb
stable/main/binary-m68k/kab_2.2.2-9.2_m68k.deb
stable/main/binary-m68k/kfind_2.2.2-9.2_m68k.deb
stable/main/binary-m68k/knotes_2.2.2-9.2_m68k.deb
stable/main/binary-m68k/kdepasswd_2.2.2-9.2_m68k.deb
stable/main/binary-m68k/klaptopdaemon_2.2.2-9.2_m68k.deb
kdeutils (4:2.2.2-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-i386/klprfax_2.2.2-9.2_i386.deb
stable/main/binary-i386/klaptopdaemon_2.2.2-9.2_i386.deb
stable/main/binary-i386/ark_2.2.2-9.2_i386.deb
stable/main/binary-i386/kcharselect_2.2.2-9.2_i386.deb
stable/main/binary-i386/khexedit_2.2.2-9.2_i386.deb
stable/main/binary-i386/klpq_2.2.2-9.2_i386.deb
stable/main/binary-i386/kdepasswd_2.2.2-9.2_i386.deb
stable/main/binary-i386/kfloppy_2.2.2-9.2_i386.deb
stable/main/binary-i386/ktimer_2.2.2-9.2_i386.deb
stable/main/binary-i386/kfind_2.2.2-9.2_i386.deb
stable/main/binary-i386/knotes_2.2.2-9.2_i386.deb
stable/main/binary-i386/kdf_2.2.2-9.2_i386.deb
stable/main/binary-i386/kab_2.2.2-9.2_i386.deb
stable/main/binary-i386/kpm_2.2.2-9.2_i386.deb
stable/main/binary-i386/kcalc_2.2.2-9.2_i386.deb
stable/main/binary-i386/karm_2.2.2-9.2_i386.deb
stable/main/binary-i386/kjots_2.2.2-9.2_i386.deb
stable/main/binary-i386/kljettool_2.2.2-9.2_i386.deb
stable/main/binary-i386/kedit_2.2.2-9.2_i386.deb
kdeutils (4:2.2.2-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-hppa/kedit_2.2.2-9.2_hppa.deb
stable/main/binary-hppa/kab_2.2.2-9.2_hppa.deb
stable/main/binary-hppa/klpq_2.2.2-9.2_hppa.deb
stable/main/binary-hppa/karm_2.2.2-9.2_hppa.deb
stable/main/binary-hppa/kljettool_2.2.2-9.2_hppa.deb
stable/main/binary-hppa/kjots_2.2.2-9.2_hppa.deb
stable/main/binary-hppa/ark_2.2.2-9.2_hppa.deb
stable/main/binary-hppa/kdf_2.2.2-9.2_hppa.deb
stable/main/binary-hppa/kdepasswd_2.2.2-9.2_hppa.deb
stable/main/binary-hppa/ktimer_2.2.2-9.2_hppa.deb
stable/main/binary-hppa/khexedit_2.2.2-9.2_hppa.deb
stable/main/binary-hppa/klprfax_2.2.2-9.2_hppa.deb
stable/main/binary-hppa/knotes_2.2.2-9.2_hppa.deb
stable/main/binary-hppa/kfind_2.2.2-9.2_hppa.deb
stable/main/binary-hppa/kfloppy_2.2.2-9.2_hppa.deb
stable/main/binary-hppa/kcalc_2.2.2-9.2_hppa.deb
stable/main/binary-hppa/kcharselect_2.2.2-9.2_hppa.deb
stable/main/binary-hppa/klaptopdaemon_2.2.2-9.2_hppa.deb
stable/main/binary-hppa/kpm_2.2.2-9.2_hppa.deb
kdeutils (4:2.2.2-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-arm/kjots_2.2.2-9.2_arm.deb
stable/main/binary-arm/kfloppy_2.2.2-9.2_arm.deb
stable/main/binary-arm/khexedit_2.2.2-9.2_arm.deb
stable/main/binary-arm/kfind_2.2.2-9.2_arm.deb
stable/main/binary-arm/klpq_2.2.2-9.2_arm.deb
stable/main/binary-arm/kpm_2.2.2-9.2_arm.deb
stable/main/binary-arm/ktimer_2.2.2-9.2_arm.deb
stable/main/binary-arm/kdepasswd_2.2.2-9.2_arm.deb
stable/main/binary-arm/ark_2.2.2-9.2_arm.deb
stable/main/binary-arm/kab_2.2.2-9.2_arm.deb
stable/main/binary-arm/karm_2.2.2-9.2_arm.deb
stable/main/binary-arm/kdf_2.2.2-9.2_arm.deb
stable/main/binary-arm/knotes_2.2.2-9.2_arm.deb
stable/main/binary-arm/kcharselect_2.2.2-9.2_arm.deb
stable/main/binary-arm/klaptopdaemon_2.2.2-9.2_arm.deb
stable/main/binary-arm/kljettool_2.2.2-9.2_arm.deb
stable/main/binary-arm/klprfax_2.2.2-9.2_arm.deb
stable/main/binary-arm/kcalc_2.2.2-9.2_arm.deb
stable/main/binary-arm/kedit_2.2.2-9.2_arm.deb
kdeutils (4:2.2.2-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-alpha/kcharselect_2.2.2-9.2_alpha.deb
stable/main/binary-alpha/kab_2.2.2-9.2_alpha.deb
stable/main/binary-alpha/kdf_2.2.2-9.2_alpha.deb
stable/main/binary-alpha/klaptopdaemon_2.2.2-9.2_alpha.deb
stable/main/binary-alpha/kcalc_2.2.2-9.2_alpha.deb
stable/main/binary-alpha/kljettool_2.2.2-9.2_alpha.deb
stable/main/binary-alpha/kedit_2.2.2-9.2_alpha.deb
stable/main/binary-alpha/kfloppy_2.2.2-9.2_alpha.deb
stable/main/binary-alpha/knotes_2.2.2-9.2_alpha.deb
stable/main/binary-alpha/kdepasswd_2.2.2-9.2_alpha.deb
stable/main/binary-alpha/khexedit_2.2.2-9.2_alpha.deb
stable/main/binary-alpha/karm_2.2.2-9.2_alpha.deb
stable/main/binary-alpha/klpq_2.2.2-9.2_alpha.deb
stable/main/binary-alpha/kfind_2.2.2-9.2_alpha.deb
stable/main/binary-alpha/ktimer_2.2.2-9.2_alpha.deb
stable/main/binary-alpha/ark_2.2.2-9.2_alpha.deb
stable/main/binary-alpha/kjots_2.2.2-9.2_alpha.deb
stable/main/binary-alpha/kpm_2.2.2-9.2_alpha.deb
stable/main/binary-alpha/klprfax_2.2.2-9.2_alpha.deb
kdeutils (4:2.2.2-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-ia64/kdf_2.2.2-9.2_ia64.deb
stable/main/binary-ia64/klaptopdaemon_2.2.2-9.2_ia64.deb
stable/main/binary-ia64/kjots_2.2.2-9.2_ia64.deb
stable/main/binary-ia64/kcalc_2.2.2-9.2_ia64.deb
stable/main/source/kdeutils_2.2.2-9.2.diff.gz
stable/main/binary-ia64/kedit_2.2.2-9.2_ia64.deb
stable/main/binary-ia64/klpq_2.2.2-9.2_ia64.deb
stable/main/binary-ia64/kljettool_2.2.2-9.2_ia64.deb
stable/main/binary-ia64/kfloppy_2.2.2-9.2_ia64.deb
stable/main/binary-ia64/kab_2.2.2-9.2_ia64.deb
stable/main/binary-ia64/karm_2.2.2-9.2_ia64.deb
stable/main/binary-ia64/ktimer_2.2.2-9.2_ia64.deb
stable/main/binary-ia64/klprfax_2.2.2-9.2_ia64.deb
stable/main/binary-ia64/kpm_2.2.2-9.2_ia64.deb
stable/main/binary-ia64/kcharselect_2.2.2-9.2_ia64.deb
stable/main/binary-ia64/kdepasswd_2.2.2-9.2_ia64.deb
stable/main/binary-ia64/khexedit_2.2.2-9.2_ia64.deb
stable/main/binary-ia64/ark_2.2.2-9.2_ia64.deb
stable/main/source/kdeutils_2.2.2-9.2.dsc
stable/main/binary-ia64/kfind_2.2.2-9.2_ia64.deb
stable/main/binary-ia64/knotes_2.2.2-9.2_ia64.deb
kdeutils (4:2.2.2-9.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-s390/kandy_2.2.2-5.2_s390.deb
stable/main/binary-s390/korganizer_2.2.2-5.2_s390.deb
stable/main/binary-s390/kdepim-libs_2.2.2-5.2_s390.deb
stable/main/binary-s390/kpilot_2.2.2-5.2_s390.deb
stable/main/binary-s390/kdepim-dev_2.2.2-5.2_s390.deb
kdepim (4:2.2.2-5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-powerpc/kandy_2.2.2-5.2_powerpc.deb
stable/main/binary-powerpc/kdepim-dev_2.2.2-5.2_powerpc.deb
stable/main/binary-powerpc/kpilot_2.2.2-5.2_powerpc.deb
stable/main/binary-powerpc/korganizer_2.2.2-5.2_powerpc.deb
stable/main/binary-powerpc/kdepim-libs_2.2.2-5.2_powerpc.deb
kdepim (4:2.2.2-5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mipsel/kpilot_2.2.2-5.2_mipsel.deb
stable/main/binary-mipsel/korganizer_2.2.2-5.2_mipsel.deb
stable/main/binary-mipsel/kdepim-libs_2.2.2-5.2_mipsel.deb
stable/main/binary-mipsel/kandy_2.2.2-5.2_mipsel.deb
stable/main/binary-mipsel/kdepim-dev_2.2.2-5.2_mipsel.deb
kdepim (4:2.2.2-5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mips/kandy_2.2.2-5.2_mips.deb
stable/main/binary-mips/kdepim-dev_2.2.2-5.2_mips.deb
stable/main/binary-mips/kpilot_2.2.2-5.2_mips.deb
stable/main/binary-mips/korganizer_2.2.2-5.2_mips.deb
stable/main/binary-mips/kdepim-libs_2.2.2-5.2_mips.deb
kdepim (4:2.2.2-5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-m68k/kdepim-dev_2.2.2-5.2_m68k.deb
stable/main/binary-m68k/kandy_2.2.2-5.2_m68k.deb
stable/main/binary-m68k/korganizer_2.2.2-5.2_m68k.deb
stable/main/binary-m68k/kpilot_2.2.2-5.2_m68k.deb
stable/main/binary-m68k/kdepim-libs_2.2.2-5.2_m68k.deb
kdepim (4:2.2.2-5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-ia64/kpilot_2.2.2-5.2_ia64.deb
stable/main/binary-ia64/kdepim-libs_2.2.2-5.2_ia64.deb
stable/main/binary-ia64/kandy_2.2.2-5.2_ia64.deb
stable/main/binary-ia64/kdepim-dev_2.2.2-5.2_ia64.deb
stable/main/binary-ia64/korganizer_2.2.2-5.2_ia64.deb
kdepim (4:2.2.2-5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-i386/korganizer_2.2.2-5.2_i386.deb
stable/main/binary-i386/kpilot_2.2.2-5.2_i386.deb
stable/main/binary-i386/kdepim-dev_2.2.2-5.2_i386.deb
stable/main/binary-i386/kdepim-libs_2.2.2-5.2_i386.deb
stable/main/binary-i386/kandy_2.2.2-5.2_i386.deb
kdepim (4:2.2.2-5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-arm/korganizer_2.2.2-5.2_arm.deb
stable/main/binary-arm/kdepim-libs_2.2.2-5.2_arm.deb
stable/main/binary-arm/kdepim-dev_2.2.2-5.2_arm.deb
stable/main/binary-arm/kpilot_2.2.2-5.2_arm.deb
stable/main/binary-arm/kandy_2.2.2-5.2_arm.deb
kdepim (4:2.2.2-5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-alpha/kdepim-dev_2.2.2-5.2_alpha.deb
stable/main/binary-alpha/kandy_2.2.2-5.2_alpha.deb
stable/main/binary-alpha/korganizer_2.2.2-5.2_alpha.deb
stable/main/binary-alpha/kpilot_2.2.2-5.2_alpha.deb
stable/main/binary-alpha/kdepim-libs_2.2.2-5.2_alpha.deb
kdepim (4:2.2.2-5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-sparc/korganizer_2.2.2-5.2_sparc.deb
stable/main/source/kdepim_2.2.2-5.2.dsc
stable/main/binary-sparc/kandy_2.2.2-5.2_sparc.deb
stable/main/source/kdepim_2.2.2-5.2.diff.gz
stable/main/binary-sparc/kdepim-libs_2.2.2-5.2_sparc.deb
stable/main/binary-sparc/kpilot_2.2.2-5.2_sparc.deb
stable/main/binary-sparc/kdepim-dev_2.2.2-5.2_sparc.deb
kdepim (4:2.2.2-5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-i386/kdict_2.2.2-14.6_i386.deb
stable/main/binary-i386/knewsticker_2.2.2-14.6_i386.deb
stable/main/binary-i386/knode_2.2.2-14.6_i386.deb
stable/main/binary-i386/kmail_2.2.2-14.6_i386.deb
stable/main/binary-i386/ktalkd_2.2.2-14.6_i386.deb
stable/main/binary-i386/klisa_2.2.2-14.6_i386.deb
stable/main/binary-i386/libkdenetwork1_2.2.2-14.6_i386.deb
stable/main/binary-i386/libmimelib-dev_2.2.2-14.6_i386.deb
stable/main/binary-i386/libmimelib1_2.2.2-14.6_i386.deb
stable/main/binary-i386/kppp_2.2.2-14.6_i386.deb
stable/main/binary-i386/ksirc_2.2.2-14.6_i386.deb
stable/main/binary-i386/kit_2.2.2-14.6_i386.deb
stable/main/binary-i386/korn_2.2.2-14.6_i386.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-s390/kscd_2.2.2-8.2_s390.deb
stable/main/binary-s390/libarts-mpeglib_2.2.2-8.2_s390.deb
stable/main/binary-s390/noatun_2.2.2-8.2_s390.deb
stable/main/binary-s390/artsbuilder_2.2.2-8.2_s390.deb
stable/main/binary-s390/kmid_2.2.2-8.2_s390.deb
stable/main/binary-s390/kmidi_2.2.2-8.2_s390.deb
stable/main/binary-s390/mpeglib_2.2.2-8.2_s390.deb
stable/main/binary-s390/kdemultimedia-dev_2.2.2-8.2_s390.deb
stable/main/binary-s390/kmix_2.2.2-8.2_s390.deb
kdemultimedia (4:2.2.2-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-powerpc/mpeglib_2.2.2-8.2_powerpc.deb
stable/main/binary-powerpc/kscd_2.2.2-8.2_powerpc.deb
stable/main/binary-powerpc/noatun_2.2.2-8.2_powerpc.deb
stable/main/binary-powerpc/artsbuilder_2.2.2-8.2_powerpc.deb
stable/main/binary-powerpc/kmid_2.2.2-8.2_powerpc.deb
stable/main/binary-powerpc/kmix_2.2.2-8.2_powerpc.deb
stable/main/binary-powerpc/libarts-mpeglib_2.2.2-8.2_powerpc.deb
stable/main/binary-powerpc/kmidi_2.2.2-8.2_powerpc.deb
stable/main/binary-powerpc/kdemultimedia-dev_2.2.2-8.2_powerpc.deb
kdemultimedia (4:2.2.2-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-m68k/noatun_2.2.2-8.2_m68k.deb
stable/main/binary-m68k/artsbuilder_2.2.2-8.2_m68k.deb
stable/main/binary-m68k/mpeglib_2.2.2-8.2_m68k.deb
stable/main/binary-m68k/kmidi_2.2.2-8.2_m68k.deb
stable/main/binary-m68k/kdemultimedia-dev_2.2.2-8.2_m68k.deb
stable/main/binary-m68k/kscd_2.2.2-8.2_m68k.deb
stable/main/binary-m68k/kmix_2.2.2-8.2_m68k.deb
stable/main/binary-m68k/libarts-mpeglib_2.2.2-8.2_m68k.deb
stable/main/binary-m68k/kmid_2.2.2-8.2_m68k.deb
kdemultimedia (4:2.2.2-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-ia64/artsbuilder_2.2.2-8.2_ia64.deb
stable/main/binary-ia64/noatun_2.2.2-8.2_ia64.deb
stable/main/binary-ia64/kscd_2.2.2-8.2_ia64.deb
stable/main/binary-ia64/libarts-mpeglib_2.2.2-8.2_ia64.deb
stable/main/binary-ia64/kmix_2.2.2-8.2_ia64.deb
stable/main/binary-ia64/mpeglib_2.2.2-8.2_ia64.deb
stable/main/binary-ia64/kmidi_2.2.2-8.2_ia64.deb
stable/main/binary-ia64/kdemultimedia-dev_2.2.2-8.2_ia64.deb
stable/main/binary-ia64/kmid_2.2.2-8.2_ia64.deb
kdemultimedia (4:2.2.2-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-i386/kdemultimedia-dev_2.2.2-8.2_i386.deb
stable/main/binary-i386/kmid_2.2.2-8.2_i386.deb
stable/main/binary-i386/kmix_2.2.2-8.2_i386.deb
stable/main/binary-i386/kmidi_2.2.2-8.2_i386.deb
stable/main/binary-i386/kscd_2.2.2-8.2_i386.deb
stable/main/binary-i386/libarts-mpeglib_2.2.2-8.2_i386.deb
stable/main/binary-i386/noatun_2.2.2-8.2_i386.deb
stable/main/binary-i386/artsbuilder_2.2.2-8.2_i386.deb
stable/main/binary-i386/mpeglib_2.2.2-8.2_i386.deb
kdemultimedia (4:2.2.2-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-hppa/kmix_2.2.2-8.2_hppa.deb
stable/main/binary-hppa/libarts-mpeglib_2.2.2-8.2_hppa.deb
stable/main/binary-hppa/mpeglib_2.2.2-8.2_hppa.deb
stable/main/binary-hppa/artsbuilder_2.2.2-8.2_hppa.deb
stable/main/binary-hppa/kdemultimedia-dev_2.2.2-8.2_hppa.deb
stable/main/binary-hppa/kmidi_2.2.2-8.2_hppa.deb
stable/main/binary-hppa/kscd_2.2.2-8.2_hppa.deb
stable/main/binary-hppa/kmid_2.2.2-8.2_hppa.deb
stable/main/binary-hppa/noatun_2.2.2-8.2_hppa.deb
kdemultimedia (4:2.2.2-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-arm/kmid_2.2.2-8.2_arm.deb
stable/main/binary-arm/artsbuilder_2.2.2-8.2_arm.deb
stable/main/binary-arm/kdemultimedia-dev_2.2.2-8.2_arm.deb
stable/main/binary-arm/kscd_2.2.2-8.2_arm.deb
stable/main/binary-arm/libarts-mpeglib_2.2.2-8.2_arm.deb
stable/main/binary-arm/noatun_2.2.2-8.2_arm.deb
stable/main/binary-arm/mpeglib_2.2.2-8.2_arm.deb
stable/main/binary-arm/kmix_2.2.2-8.2_arm.deb
stable/main/binary-arm/kmidi_2.2.2-8.2_arm.deb
kdemultimedia (4:2.2.2-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-alpha/kmidi_2.2.2-8.2_alpha.deb
stable/main/binary-alpha/kscd_2.2.2-8.2_alpha.deb
stable/main/binary-alpha/kmix_2.2.2-8.2_alpha.deb
stable/main/binary-alpha/noatun_2.2.2-8.2_alpha.deb
stable/main/binary-alpha/libarts-mpeglib_2.2.2-8.2_alpha.deb
stable/main/binary-alpha/kmid_2.2.2-8.2_alpha.deb
stable/main/binary-alpha/kdemultimedia-dev_2.2.2-8.2_alpha.deb
stable/main/binary-alpha/mpeglib_2.2.2-8.2_alpha.deb
stable/main/binary-alpha/artsbuilder_2.2.2-8.2_alpha.deb
kdemultimedia (4:2.2.2-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-sparc/kmix_2.2.2-8.2_sparc.deb
stable/main/source/kdemultimedia_2.2.2-8.2.diff.gz
stable/main/binary-sparc/kscd_2.2.2-8.2_sparc.deb
stable/main/source/kdemultimedia_2.2.2-8.2.dsc
stable/main/binary-sparc/libarts-mpeglib_2.2.2-8.2_sparc.deb
stable/main/binary-sparc/kdemultimedia-dev_2.2.2-8.2_sparc.deb
stable/main/binary-sparc/kmid_2.2.2-8.2_sparc.deb
stable/main/binary-sparc/artsbuilder_2.2.2-8.2_sparc.deb
stable/main/binary-sparc/noatun_2.2.2-8.2_sparc.deb
stable/main/binary-sparc/kmidi_2.2.2-8.2_sparc.deb
stable/main/binary-sparc/mpeglib_2.2.2-8.2_sparc.deb
kdemultimedia (4:2.2.2-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-sparc/libkmid-dev_2.2.2-13.woody.12_sparc.deb
stable/main/binary-sparc/libkmid_2.2.2-13.woody.12_sparc.deb
stable/main/binary-sparc/kdelibs3-cups_2.2.2-13.woody.12_sparc.deb
stable/main/binary-sparc/kdelibs-dev_2.2.2-13.woody.12_sparc.deb
stable/main/binary-sparc/kdelibs3_2.2.2-13.woody.12_sparc.deb
stable/main/binary-sparc/libarts-alsa_2.2.2-13.woody.12_sparc.deb
stable/main/binary-sparc/kdelibs3-bin_2.2.2-13.woody.12_sparc.deb
stable/main/binary-sparc/libkmid-alsa_2.2.2-13.woody.12_sparc.deb
stable/main/binary-sparc/libarts-dev_2.2.2-13.woody.12_sparc.deb
stable/main/binary-sparc/libarts_2.2.2-13.woody.12_sparc.deb
kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch from Waldo Bastian <bastian@kde.org> to fix
    temporary filename vulnerabilities in the DCOP server
    [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689]
    <http://www.kde.org/info/security/advisory-20040811-1.txt>
  * Bump the version number so the buildd will pick the package again
    since some refuse to upload.


stable/main/binary-s390/libkmid-alsa_2.2.2-13.woody.12_s390.deb
stable/main/binary-s390/libarts-dev_2.2.2-13.woody.12_s390.deb
stable/main/binary-s390/kdelibs3_2.2.2-13.woody.12_s390.deb
stable/main/binary-s390/libarts_2.2.2-13.woody.12_s390.deb
stable/main/binary-s390/libarts-alsa_2.2.2-13.woody.12_s390.deb
stable/main/binary-s390/libkmid_2.2.2-13.woody.12_s390.deb
stable/main/binary-s390/kdelibs3-cups_2.2.2-13.woody.12_s390.deb
stable/main/binary-s390/kdelibs-dev_2.2.2-13.woody.12_s390.deb
stable/main/binary-s390/kdelibs3-bin_2.2.2-13.woody.12_s390.deb
stable/main/binary-s390/libkmid-dev_2.2.2-13.woody.12_s390.deb
kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch from Waldo Bastian <bastian@kde.org> to fix
    temporary filename vulnerabilities in the DCOP server
    [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689]
    <http://www.kde.org/info/security/advisory-20040811-1.txt>
  * Bump the version number so the buildd will pick the package again
    since some refuse to upload.


stable/main/binary-powerpc/libarts-alsa_2.2.2-13.woody.12_powerpc.deb
stable/main/binary-powerpc/kdelibs3_2.2.2-13.woody.12_powerpc.deb
stable/main/binary-powerpc/kdelibs-dev_2.2.2-13.woody.12_powerpc.deb
stable/main/binary-powerpc/libarts-dev_2.2.2-13.woody.12_powerpc.deb
stable/main/binary-powerpc/libkmid-alsa_2.2.2-13.woody.12_powerpc.deb
stable/main/binary-powerpc/kdelibs3-bin_2.2.2-13.woody.12_powerpc.deb
stable/main/binary-powerpc/kdelibs3-cups_2.2.2-13.woody.12_powerpc.deb
stable/main/binary-powerpc/libkmid-dev_2.2.2-13.woody.12_powerpc.deb
stable/main/binary-powerpc/libarts_2.2.2-13.woody.12_powerpc.deb
stable/main/binary-powerpc/libkmid_2.2.2-13.woody.12_powerpc.deb
kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch from Waldo Bastian <bastian@kde.org> to fix
    temporary filename vulnerabilities in the DCOP server
    [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689]
    <http://www.kde.org/info/security/advisory-20040811-1.txt>
  * Bump the version number so the buildd will pick the package again
    since some refuse to upload.


stable/main/binary-mipsel/libkmid-dev_2.2.2-13.woody.12_mipsel.deb
stable/main/binary-mipsel/kdelibs-dev_2.2.2-13.woody.12_mipsel.deb
stable/main/binary-mipsel/kdelibs3-bin_2.2.2-13.woody.12_mipsel.deb
stable/main/binary-mipsel/libarts-dev_2.2.2-13.woody.12_mipsel.deb
stable/main/binary-mipsel/libkmid-alsa_2.2.2-13.woody.12_mipsel.deb
stable/main/binary-mipsel/libarts_2.2.2-13.woody.12_mipsel.deb
stable/main/binary-mipsel/kdelibs3-cups_2.2.2-13.woody.12_mipsel.deb
stable/main/binary-mipsel/libkmid_2.2.2-13.woody.12_mipsel.deb
stable/main/binary-mipsel/libarts-alsa_2.2.2-13.woody.12_mipsel.deb
stable/main/binary-mipsel/kdelibs3_2.2.2-13.woody.12_mipsel.deb
kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch from Waldo Bastian <bastian@kde.org> to fix
    temporary filename vulnerabilities in the DCOP server
    [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689]
    <http://www.kde.org/info/security/advisory-20040811-1.txt>
  * Bump the version number so the buildd will pick the package again
    since some refuse to upload.


stable/main/binary-mips/kdelibs3-bin_2.2.2-13.woody.12_mips.deb
stable/main/binary-mips/kdelibs-dev_2.2.2-13.woody.12_mips.deb
stable/main/binary-mips/libkmid-dev_2.2.2-13.woody.12_mips.deb
stable/main/binary-mips/libarts_2.2.2-13.woody.12_mips.deb
stable/main/binary-mips/libarts-dev_2.2.2-13.woody.12_mips.deb
stable/main/binary-mips/kdelibs3_2.2.2-13.woody.12_mips.deb
stable/main/binary-mips/libkmid-alsa_2.2.2-13.woody.12_mips.deb
stable/main/binary-mips/libkmid_2.2.2-13.woody.12_mips.deb
stable/main/binary-mips/kdelibs3-cups_2.2.2-13.woody.12_mips.deb
stable/main/binary-mips/libarts-alsa_2.2.2-13.woody.12_mips.deb
kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch from Waldo Bastian <bastian@kde.org> to fix
    temporary filename vulnerabilities in the DCOP server
    [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689]
    <http://www.kde.org/info/security/advisory-20040811-1.txt>
  * Bump the version number so the buildd will pick the package again
    since some refuse to upload.


stable/main/binary-m68k/kdelibs-dev_2.2.2-13.woody.12_m68k.deb
stable/main/binary-m68k/kdelibs3_2.2.2-13.woody.12_m68k.deb
stable/main/binary-m68k/libkmid-dev_2.2.2-13.woody.12_m68k.deb
stable/main/binary-m68k/kdelibs3-cups_2.2.2-13.woody.12_m68k.deb
stable/main/binary-m68k/libkmid_2.2.2-13.woody.12_m68k.deb
stable/main/binary-m68k/libkmid-alsa_2.2.2-13.woody.12_m68k.deb
stable/main/binary-m68k/kdelibs3-bin_2.2.2-13.woody.12_m68k.deb
stable/main/binary-m68k/libarts-dev_2.2.2-13.woody.12_m68k.deb
stable/main/binary-m68k/libarts-alsa_2.2.2-13.woody.12_m68k.deb
stable/main/binary-m68k/libarts_2.2.2-13.woody.12_m68k.deb
kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch from Waldo Bastian <bastian@kde.org> to fix
    temporary filename vulnerabilities in the DCOP server
    [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689]
    <http://www.kde.org/info/security/advisory-20040811-1.txt>
  * Bump the version number so the buildd will pick the package again
    since some refuse to upload.


stable/main/binary-ia64/libarts_2.2.2-13.woody.12_ia64.deb
stable/main/binary-ia64/libkmid_2.2.2-13.woody.12_ia64.deb
stable/main/binary-ia64/libkmid-alsa_2.2.2-13.woody.12_ia64.deb
stable/main/binary-ia64/kdelibs3-bin_2.2.2-13.woody.12_ia64.deb
stable/main/binary-ia64/libarts-dev_2.2.2-13.woody.12_ia64.deb
stable/main/binary-ia64/kdelibs3_2.2.2-13.woody.12_ia64.deb
stable/main/binary-ia64/kdelibs-dev_2.2.2-13.woody.12_ia64.deb
stable/main/binary-ia64/kdelibs3-cups_2.2.2-13.woody.12_ia64.deb
stable/main/binary-ia64/libkmid-dev_2.2.2-13.woody.12_ia64.deb
stable/main/binary-ia64/libarts-alsa_2.2.2-13.woody.12_ia64.deb
kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch from Waldo Bastian <bastian@kde.org> to fix
    temporary filename vulnerabilities in the DCOP server
    [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689]
    <http://www.kde.org/info/security/advisory-20040811-1.txt>
  * Bump the version number so the buildd will pick the package again
    since some refuse to upload.


stable/main/binary-i386/libarts-alsa_2.2.2-13.woody.12_i386.deb
stable/main/binary-i386/libarts_2.2.2-13.woody.12_i386.deb
stable/main/binary-i386/kdelibs-dev_2.2.2-13.woody.12_i386.deb
stable/main/binary-i386/kdelibs3-bin_2.2.2-13.woody.12_i386.deb
stable/main/binary-i386/libarts-dev_2.2.2-13.woody.12_i386.deb
stable/main/binary-i386/kdelibs3-cups_2.2.2-13.woody.12_i386.deb
stable/main/binary-i386/libkmid_2.2.2-13.woody.12_i386.deb
stable/main/binary-i386/libkmid-alsa_2.2.2-13.woody.12_i386.deb
stable/main/binary-i386/kdelibs3_2.2.2-13.woody.12_i386.deb
stable/main/binary-i386/libkmid-dev_2.2.2-13.woody.12_i386.deb
kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch from Waldo Bastian <bastian@kde.org> to fix
    temporary filename vulnerabilities in the DCOP server
    [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689]
    <http://www.kde.org/info/security/advisory-20040811-1.txt>
  * Bump the version number so the buildd will pick the package again
    since some refuse to upload.


stable/main/binary-hppa/kdelibs3-cups_2.2.2-13.woody.12_hppa.deb
stable/main/binary-hppa/libarts-dev_2.2.2-13.woody.12_hppa.deb
stable/main/binary-hppa/kdelibs3-bin_2.2.2-13.woody.12_hppa.deb
stable/main/binary-hppa/kdelibs-dev_2.2.2-13.woody.12_hppa.deb
stable/main/binary-hppa/libarts-alsa_2.2.2-13.woody.12_hppa.deb
stable/main/binary-hppa/kdelibs3_2.2.2-13.woody.12_hppa.deb
stable/main/binary-hppa/libkmid-dev_2.2.2-13.woody.12_hppa.deb
stable/main/binary-hppa/libkmid_2.2.2-13.woody.12_hppa.deb
stable/main/binary-hppa/libkmid-alsa_2.2.2-13.woody.12_hppa.deb
stable/main/binary-hppa/libarts_2.2.2-13.woody.12_hppa.deb
kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch from Waldo Bastian <bastian@kde.org> to fix
    temporary filename vulnerabilities in the DCOP server
    [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689]
    <http://www.kde.org/info/security/advisory-20040811-1.txt>
  * Bump the version number so the buildd will pick the package again
    since some refuse to upload.


stable/main/binary-arm/libkmid_2.2.2-13.woody.12_arm.deb
stable/main/binary-arm/libkmid-dev_2.2.2-13.woody.12_arm.deb
stable/main/binary-arm/libkmid-alsa_2.2.2-13.woody.12_arm.deb
stable/main/binary-arm/kdelibs-dev_2.2.2-13.woody.12_arm.deb
stable/main/binary-arm/kdelibs3-bin_2.2.2-13.woody.12_arm.deb
stable/main/binary-arm/kdelibs3-cups_2.2.2-13.woody.12_arm.deb
stable/main/binary-arm/libarts_2.2.2-13.woody.12_arm.deb
stable/main/binary-arm/kdelibs3_2.2.2-13.woody.12_arm.deb
stable/main/binary-arm/libarts-dev_2.2.2-13.woody.12_arm.deb
stable/main/binary-arm/libarts-alsa_2.2.2-13.woody.12_arm.deb
kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch from Waldo Bastian <bastian@kde.org> to fix
    temporary filename vulnerabilities in the DCOP server
    [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689]
    <http://www.kde.org/info/security/advisory-20040811-1.txt>
  * Bump the version number so the buildd will pick the package again
    since some refuse to upload.


stable/main/binary-alpha/kdelibs3-cups_2.2.2-13.woody.12_alpha.deb
stable/main/binary-alpha/libkmid-dev_2.2.2-13.woody.12_alpha.deb
stable/main/binary-alpha/kdelibs3_2.2.2-13.woody.12_alpha.deb
stable/main/binary-alpha/kdelibs-dev_2.2.2-13.woody.12_alpha.deb
stable/main/binary-alpha/libkmid-alsa_2.2.2-13.woody.12_alpha.deb
stable/main/binary-alpha/libarts-dev_2.2.2-13.woody.12_alpha.deb
stable/main/binary-all/kdelibs3-doc_2.2.2-13.woody.12_all.deb
stable/main/binary-alpha/kdelibs3-bin_2.2.2-13.woody.12_alpha.deb
stable/main/binary-alpha/libarts_2.2.2-13.woody.12_alpha.deb
stable/main/binary-alpha/libarts-alsa_2.2.2-13.woody.12_alpha.deb
stable/main/source/kdelibs_2.2.2-13.woody.12.dsc
stable/main/source/kdelibs_2.2.2-13.woody.12.diff.gz
stable/main/binary-alpha/libkmid_2.2.2-13.woody.12_alpha.deb
kdelibs (4:2.2.2-13.woody.12) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch from Waldo Bastian <bastian@kde.org> to fix
    temporary filename vulnerabilities in the DCOP server
    [dcop/dcopserver.cpp, kdecore/kstddirs.cpp, CAN-2004-0689]
    <http://www.kde.org/info/security/advisory-20040811-1.txt>
  * Bump the version number so the buildd will pick the package again
    since some refuse to upload.


stable/main/binary-s390/ksmiletris_2.2.2-2.2_s390.deb
stable/main/binary-s390/kjumpingcube_2.2.2-2.2_s390.deb
stable/main/binary-s390/ktuberling_2.2.2-2.2_s390.deb
stable/main/binary-s390/kreversi_2.2.2-2.2_s390.deb
stable/main/binary-s390/kbattleship_2.2.2-2.2_s390.deb
stable/main/binary-s390/ksokoban_2.2.2-2.2_s390.deb
stable/main/binary-s390/kbackgammon_2.2.2-2.2_s390.deb
stable/main/binary-s390/kmahjongg_2.2.2-2.2_s390.deb
stable/main/binary-s390/kwin4_2.2.2-2.2_s390.deb
stable/main/binary-s390/libkdegames_2.2.2-2.2_s390.deb
stable/main/binary-s390/ksnake_2.2.2-2.2_s390.deb
stable/main/binary-s390/kshisen_2.2.2-2.2_s390.deb
stable/main/binary-s390/ksame_2.2.2-2.2_s390.deb
stable/main/binary-s390/kmines_2.2.2-2.2_s390.deb
stable/main/binary-s390/kasteroids_2.2.2-2.2_s390.deb
stable/main/binary-s390/kabalone_2.2.2-2.2_s390.deb
stable/main/binary-s390/ksirtet_2.2.2-2.2_s390.deb
stable/main/binary-s390/katomic_2.2.2-2.2_s390.deb
stable/main/binary-s390/ktron_2.2.2-2.2_s390.deb
stable/main/binary-s390/kjezz_2.2.2-2.2_s390.deb
stable/main/binary-s390/klines_2.2.2-2.2_s390.deb
stable/main/binary-s390/lskat_2.2.2-2.2_s390.deb
stable/main/binary-s390/kblackbox_2.2.2-2.2_s390.deb
stable/main/binary-s390/konquest_2.2.2-2.2_s390.deb
stable/main/binary-s390/kpat_2.2.2-2.2_s390.deb
stable/main/binary-s390/kspaceduel_2.2.2-2.2_s390.deb
stable/main/binary-s390/kpoker_2.2.2-2.2_s390.deb
kdegames (4:2.2.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-powerpc/ksirtet_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/klines_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/kpat_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/kshisen_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/kasteroids_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/kmines_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/kbackgammon_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/katomic_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/ksnake_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/ksame_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/kblackbox_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/kwin4_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/ktron_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/kjumpingcube_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/ksmiletris_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/kjezz_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/kabalone_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/libkdegames_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/kmahjongg_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/ksokoban_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/lskat_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/kspaceduel_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/kbattleship_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/kreversi_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/kpoker_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/ktuberling_2.2.2-2.2_powerpc.deb
stable/main/binary-powerpc/konquest_2.2.2-2.2_powerpc.deb
kdegames (4:2.2.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mipsel/ksokoban_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/kmahjongg_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/kabalone_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/ksnake_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/kasteroids_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/ksame_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/ktuberling_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/kbackgammon_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/lskat_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/kblackbox_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/kwin4_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/kbattleship_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/katomic_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/libkdegames_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/klines_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/kjumpingcube_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/kmines_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/ksmiletris_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/kreversi_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/kpat_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/ksirtet_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/konquest_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/ktron_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/kjezz_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/kpoker_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/kshisen_2.2.2-2.2_mipsel.deb
stable/main/binary-mipsel/kspaceduel_2.2.2-2.2_mipsel.deb
kdegames (4:2.2.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mips/kmahjongg_2.2.2-2.2_mips.deb
stable/main/binary-mips/ksokoban_2.2.2-2.2_mips.deb
stable/main/binary-mips/kasteroids_2.2.2-2.2_mips.deb
stable/main/binary-mips/kspaceduel_2.2.2-2.2_mips.deb
stable/main/binary-mips/kwin4_2.2.2-2.2_mips.deb
stable/main/binary-mips/kabalone_2.2.2-2.2_mips.deb
stable/main/binary-mips/kjumpingcube_2.2.2-2.2_mips.deb
stable/main/binary-mips/kblackbox_2.2.2-2.2_mips.deb
stable/main/binary-mips/ktuberling_2.2.2-2.2_mips.deb
stable/main/binary-mips/lskat_2.2.2-2.2_mips.deb
stable/main/binary-mips/kmines_2.2.2-2.2_mips.deb
stable/main/binary-mips/libkdegames_2.2.2-2.2_mips.deb
stable/main/binary-mips/ksame_2.2.2-2.2_mips.deb
stable/main/binary-mips/ktron_2.2.2-2.2_mips.deb
stable/main/binary-mips/kbackgammon_2.2.2-2.2_mips.deb
stable/main/binary-mips/kbattleship_2.2.2-2.2_mips.deb
stable/main/binary-mips/ksmiletris_2.2.2-2.2_mips.deb
stable/main/binary-mips/klines_2.2.2-2.2_mips.deb
stable/main/binary-mips/kreversi_2.2.2-2.2_mips.deb
stable/main/binary-mips/kpat_2.2.2-2.2_mips.deb
stable/main/binary-mips/konquest_2.2.2-2.2_mips.deb
stable/main/binary-mips/ksnake_2.2.2-2.2_mips.deb
stable/main/binary-mips/kpoker_2.2.2-2.2_mips.deb
stable/main/binary-mips/kjezz_2.2.2-2.2_mips.deb
stable/main/binary-mips/katomic_2.2.2-2.2_mips.deb
stable/main/binary-mips/ksirtet_2.2.2-2.2_mips.deb
stable/main/binary-mips/kshisen_2.2.2-2.2_mips.deb
kdegames (4:2.2.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-m68k/kbackgammon_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/kspaceduel_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/kpoker_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/kjumpingcube_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/ktron_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/klines_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/kbattleship_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/kmahjongg_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/ksame_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/katomic_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/ksokoban_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/libkdegames_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/kwin4_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/ksmiletris_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/lskat_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/kreversi_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/ksirtet_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/kabalone_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/kmines_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/kshisen_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/kpat_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/kjezz_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/ktuberling_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/kasteroids_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/konquest_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/ksnake_2.2.2-2.2_m68k.deb
stable/main/binary-m68k/kblackbox_2.2.2-2.2_m68k.deb
kdegames (4:2.2.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-ia64/kjumpingcube_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/ksmiletris_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/kreversi_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/ksokoban_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/kbackgammon_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/kmahjongg_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/libkdegames_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/kabalone_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/kwin4_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/kshisen_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/kmines_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/ksnake_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/kasteroids_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/kspaceduel_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/kblackbox_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/ksirtet_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/kbattleship_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/ktuberling_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/katomic_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/klines_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/ktron_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/ksame_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/konquest_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/kpoker_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/kpat_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/kjezz_2.2.2-2.2_ia64.deb
stable/main/binary-ia64/lskat_2.2.2-2.2_ia64.deb
kdegames (4:2.2.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-i386/kwin4_2.2.2-2.2_i386.deb
stable/main/binary-i386/kjezz_2.2.2-2.2_i386.deb
stable/main/binary-i386/kmahjongg_2.2.2-2.2_i386.deb
stable/main/binary-i386/ksokoban_2.2.2-2.2_i386.deb
stable/main/binary-i386/kspaceduel_2.2.2-2.2_i386.deb
stable/main/binary-i386/ksnake_2.2.2-2.2_i386.deb
stable/main/binary-i386/klines_2.2.2-2.2_i386.deb
stable/main/binary-i386/kpoker_2.2.2-2.2_i386.deb
stable/main/binary-i386/ktuberling_2.2.2-2.2_i386.deb
stable/main/binary-i386/konquest_2.2.2-2.2_i386.deb
stable/main/binary-i386/kbattleship_2.2.2-2.2_i386.deb
stable/main/binary-i386/ksirtet_2.2.2-2.2_i386.deb
stable/main/binary-i386/kmines_2.2.2-2.2_i386.deb
stable/main/binary-i386/kshisen_2.2.2-2.2_i386.deb
stable/main/binary-i386/katomic_2.2.2-2.2_i386.deb
stable/main/binary-i386/kblackbox_2.2.2-2.2_i386.deb
stable/main/binary-i386/libkdegames_2.2.2-2.2_i386.deb
stable/main/binary-i386/kpat_2.2.2-2.2_i386.deb
stable/main/binary-i386/lskat_2.2.2-2.2_i386.deb
stable/main/binary-i386/kbackgammon_2.2.2-2.2_i386.deb
stable/main/binary-i386/ktron_2.2.2-2.2_i386.deb
stable/main/binary-i386/ksame_2.2.2-2.2_i386.deb
stable/main/binary-i386/kreversi_2.2.2-2.2_i386.deb
stable/main/binary-i386/kjumpingcube_2.2.2-2.2_i386.deb
stable/main/binary-i386/kasteroids_2.2.2-2.2_i386.deb
stable/main/binary-i386/kabalone_2.2.2-2.2_i386.deb
stable/main/binary-i386/ksmiletris_2.2.2-2.2_i386.deb
kdegames (4:2.2.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-hppa/kblackbox_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/ksirtet_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/kbackgammon_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/konquest_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/kpoker_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/kpat_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/kbattleship_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/katomic_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/ksokoban_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/kreversi_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/ksmiletris_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/kmahjongg_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/kjumpingcube_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/kwin4_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/kspaceduel_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/klines_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/kshisen_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/ktron_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/ksame_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/libkdegames_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/kmines_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/kabalone_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/lskat_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/kjezz_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/ksnake_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/ktuberling_2.2.2-2.2_hppa.deb
stable/main/binary-hppa/kasteroids_2.2.2-2.2_hppa.deb
kdegames (4:2.2.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-arm/kshisen_2.2.2-2.2_arm.deb
stable/main/binary-arm/kspaceduel_2.2.2-2.2_arm.deb
stable/main/binary-arm/lskat_2.2.2-2.2_arm.deb
stable/main/binary-arm/ktron_2.2.2-2.2_arm.deb
stable/main/binary-arm/klines_2.2.2-2.2_arm.deb
stable/main/binary-arm/kmines_2.2.2-2.2_arm.deb
stable/main/binary-arm/konquest_2.2.2-2.2_arm.deb
stable/main/binary-arm/kpoker_2.2.2-2.2_arm.deb
stable/main/binary-arm/kpat_2.2.2-2.2_arm.deb
stable/main/binary-arm/kasteroids_2.2.2-2.2_arm.deb
stable/main/binary-arm/libkdegames_2.2.2-2.2_arm.deb
stable/main/binary-arm/kabalone_2.2.2-2.2_arm.deb
stable/main/binary-arm/kjezz_2.2.2-2.2_arm.deb
stable/main/binary-arm/ksame_2.2.2-2.2_arm.deb
stable/main/binary-arm/kmahjongg_2.2.2-2.2_arm.deb
stable/main/binary-arm/ksokoban_2.2.2-2.2_arm.deb
stable/main/binary-arm/kwin4_2.2.2-2.2_arm.deb
stable/main/binary-arm/ksnake_2.2.2-2.2_arm.deb
stable/main/binary-arm/kblackbox_2.2.2-2.2_arm.deb
stable/main/binary-arm/ksirtet_2.2.2-2.2_arm.deb
stable/main/binary-arm/kbackgammon_2.2.2-2.2_arm.deb
stable/main/binary-arm/kreversi_2.2.2-2.2_arm.deb
stable/main/binary-arm/katomic_2.2.2-2.2_arm.deb
stable/main/binary-arm/ksmiletris_2.2.2-2.2_arm.deb
stable/main/binary-arm/ktuberling_2.2.2-2.2_arm.deb
stable/main/binary-arm/kjumpingcube_2.2.2-2.2_arm.deb
stable/main/binary-arm/kbattleship_2.2.2-2.2_arm.deb
kdegames (4:2.2.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-alpha/kreversi_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/ksmiletris_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/kpoker_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/kabalone_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/konquest_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/kjezz_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/kwin4_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/ksame_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/kmines_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/kshisen_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/kmahjongg_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/ksokoban_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/lskat_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/kpat_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/ktuberling_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/kasteroids_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/ktron_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/kjumpingcube_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/kbattleship_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/libkdegames_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/kbackgammon_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/kblackbox_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/klines_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/ksnake_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/kspaceduel_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/katomic_2.2.2-2.2_alpha.deb
stable/main/binary-alpha/ksirtet_2.2.2-2.2_alpha.deb
kdegames (4:2.2.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/source/kdegames_2.2.2-2.2.dsc
stable/main/binary-sparc/kpoker_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/konquest_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/lskat_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/kabalone_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/kasteroids_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/kmines_2.2.2-2.2_sparc.deb
stable/main/source/kdegames_2.2.2-2.2.diff.gz
stable/main/binary-sparc/ksokoban_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/kspaceduel_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/kblackbox_2.2.2-2.2_sparc.deb
stable/main/binary-all/kdecarddecks_2.2.2-2.2_all.deb
stable/main/binary-sparc/ktron_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/ksame_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/libkdegames_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/klines_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/kmahjongg_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/kbattleship_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/ksnake_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/ksmiletris_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/kjumpingcube_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/kreversi_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/kjezz_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/ktuberling_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/kbackgammon_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/ksirtet_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/katomic_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/kshisen_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/kpat_2.2.2-2.2_sparc.deb
stable/main/binary-sparc/kwin4_2.2.2-2.2_sparc.deb
kdegames (4:2.2.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-sparc/libkonq-dev_2.2.2-14.8_sparc.deb
stable/main/binary-sparc/kdm_2.2.2-14.8_sparc.deb
stable/main/binary-sparc/kate_2.2.2-14.8_sparc.deb
stable/main/binary-sparc/kscreensaver_2.2.2-14.8_sparc.deb
stable/main/binary-sparc/kdebase-audiolibs_2.2.2-14.8_sparc.deb
stable/main/binary-sparc/kdebase_2.2.2-14.8_sparc.deb
stable/main/binary-sparc/kdebase-dev_2.2.2-14.8_sparc.deb
stable/main/binary-sparc/libkonq3_2.2.2-14.8_sparc.deb
stable/main/binary-sparc/konqueror_2.2.2-14.8_sparc.deb
stable/main/binary-sparc/konsole_2.2.2-14.8_sparc.deb
stable/main/binary-sparc/kdebase-libs_2.2.2-14.8_sparc.deb
kdebase (4:2.2.2-14.8) stable; urgency=medium
  * NMU to fix uninstallable konqueror security update packages on powerpc;
    urgency set accordingly.
  * Update debian/control to assert that konqueror replaces versions of
    kdebase-libs less than 4:2.2.2-14.2; the original woody version of
    konqueror for powerpc had a file,
    /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs
    for every other architecture, and in every subsequent security release.
    (Closes: #178507)


stable/main/binary-s390/kdebase_2.2.2-14.8_s390.deb
stable/main/binary-s390/kdebase-audiolibs_2.2.2-14.8_s390.deb
stable/main/binary-s390/kate_2.2.2-14.8_s390.deb
stable/main/binary-s390/libkonq-dev_2.2.2-14.8_s390.deb
stable/main/binary-s390/konsole_2.2.2-14.8_s390.deb
stable/main/binary-s390/libkonq3_2.2.2-14.8_s390.deb
stable/main/binary-s390/kscreensaver_2.2.2-14.8_s390.deb
stable/main/binary-s390/kdm_2.2.2-14.8_s390.deb
stable/main/binary-s390/konqueror_2.2.2-14.8_s390.deb
stable/main/binary-s390/kdebase-dev_2.2.2-14.8_s390.deb
stable/main/binary-s390/kdebase-libs_2.2.2-14.8_s390.deb
kdebase (4:2.2.2-14.8) stable; urgency=medium
  * NMU to fix uninstallable konqueror security update packages on powerpc;
    urgency set accordingly.
  * Update debian/control to assert that konqueror replaces versions of
    kdebase-libs less than 4:2.2.2-14.2; the original woody version of
    konqueror for powerpc had a file,
    /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs
    for every other architecture, and in every subsequent security release.
    (Closes: #178507)


stable/main/binary-mipsel/libkonq3_2.2.2-14.8_mipsel.deb
stable/main/binary-mipsel/kdebase-audiolibs_2.2.2-14.8_mipsel.deb
stable/main/binary-mipsel/kdebase-libs_2.2.2-14.8_mipsel.deb
stable/main/binary-mipsel/kscreensaver_2.2.2-14.8_mipsel.deb
stable/main/binary-mipsel/libkonq-dev_2.2.2-14.8_mipsel.deb
stable/main/binary-mipsel/kdebase_2.2.2-14.8_mipsel.deb
stable/main/binary-mipsel/konsole_2.2.2-14.8_mipsel.deb
stable/main/binary-mipsel/konqueror_2.2.2-14.8_mipsel.deb
stable/main/binary-mipsel/kdebase-dev_2.2.2-14.8_mipsel.deb
stable/main/binary-mipsel/kate_2.2.2-14.8_mipsel.deb
stable/main/binary-mipsel/kdm_2.2.2-14.8_mipsel.deb
kdebase (4:2.2.2-14.8) stable; urgency=medium
  * NMU to fix uninstallable konqueror security update packages on powerpc;
    urgency set accordingly.
  * Update debian/control to assert that konqueror replaces versions of
    kdebase-libs less than 4:2.2.2-14.2; the original woody version of
    konqueror for powerpc had a file,
    /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs
    for every other architecture, and in every subsequent security release.
    (Closes: #178507)


stable/main/binary-mips/konsole_2.2.2-14.8_mips.deb
stable/main/binary-mips/libkonq3_2.2.2-14.8_mips.deb
stable/main/binary-mips/kdebase_2.2.2-14.8_mips.deb
stable/main/binary-mips/kdm_2.2.2-14.8_mips.deb
stable/main/binary-mips/kdebase-libs_2.2.2-14.8_mips.deb
stable/main/binary-mips/konqueror_2.2.2-14.8_mips.deb
stable/main/binary-mips/kate_2.2.2-14.8_mips.deb
stable/main/binary-mips/kdebase-audiolibs_2.2.2-14.8_mips.deb
stable/main/binary-mips/kdebase-dev_2.2.2-14.8_mips.deb
stable/main/binary-mips/libkonq-dev_2.2.2-14.8_mips.deb
stable/main/binary-mips/kscreensaver_2.2.2-14.8_mips.deb
kdebase (4:2.2.2-14.8) stable; urgency=medium
  * NMU to fix uninstallable konqueror security update packages on powerpc;
    urgency set accordingly.
  * Update debian/control to assert that konqueror replaces versions of
    kdebase-libs less than 4:2.2.2-14.2; the original woody version of
    konqueror for powerpc had a file,
    /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs
    for every other architecture, and in every subsequent security release.
    (Closes: #178507)


stable/main/binary-m68k/kate_2.2.2-14.8_m68k.deb
stable/main/binary-m68k/kdebase_2.2.2-14.8_m68k.deb
stable/main/binary-m68k/kdm_2.2.2-14.8_m68k.deb
stable/main/binary-m68k/konsole_2.2.2-14.8_m68k.deb
stable/main/binary-m68k/konqueror_2.2.2-14.8_m68k.deb
stable/main/binary-m68k/kscreensaver_2.2.2-14.8_m68k.deb
stable/main/binary-m68k/libkonq3_2.2.2-14.8_m68k.deb
stable/main/binary-m68k/libkonq-dev_2.2.2-14.8_m68k.deb
stable/main/binary-m68k/kdebase-libs_2.2.2-14.8_m68k.deb
stable/main/binary-m68k/kdebase-dev_2.2.2-14.8_m68k.deb
stable/main/binary-m68k/kdebase-audiolibs_2.2.2-14.8_m68k.deb
kdebase (4:2.2.2-14.8) stable; urgency=medium
  * NMU to fix uninstallable konqueror security update packages on powerpc;
    urgency set accordingly.
  * Update debian/control to assert that konqueror replaces versions of
    kdebase-libs less than 4:2.2.2-14.2; the original woody version of
    konqueror for powerpc had a file,
    /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs
    for every other architecture, and in every subsequent security release.
    (Closes: #178507)


stable/main/binary-ia64/kdm_2.2.2-14.8_ia64.deb
stable/main/binary-ia64/konqueror_2.2.2-14.8_ia64.deb
stable/main/binary-ia64/kdebase-libs_2.2.2-14.8_ia64.deb
stable/main/binary-ia64/konsole_2.2.2-14.8_ia64.deb
stable/main/binary-ia64/libkonq3_2.2.2-14.8_ia64.deb
stable/main/binary-ia64/libkonq-dev_2.2.2-14.8_ia64.deb
stable/main/binary-ia64/kdebase-audiolibs_2.2.2-14.8_ia64.deb
stable/main/binary-ia64/kdebase-dev_2.2.2-14.8_ia64.deb
stable/main/binary-ia64/kate_2.2.2-14.8_ia64.deb
stable/main/binary-ia64/kscreensaver_2.2.2-14.8_ia64.deb
stable/main/binary-ia64/kdebase_2.2.2-14.8_ia64.deb
kdebase (4:2.2.2-14.8) stable; urgency=medium
  * NMU to fix uninstallable konqueror security update packages on powerpc;
    urgency set accordingly.
  * Update debian/control to assert that konqueror replaces versions of
    kdebase-libs less than 4:2.2.2-14.2; the original woody version of
    konqueror for powerpc had a file,
    /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs
    for every other architecture, and in every subsequent security release.
    (Closes: #178507)


stable/main/binary-i386/kdebase-dev_2.2.2-14.8_i386.deb
stable/main/binary-i386/kdebase_2.2.2-14.8_i386.deb
stable/main/binary-i386/kdebase-libs_2.2.2-14.8_i386.deb
stable/main/binary-i386/kdm_2.2.2-14.8_i386.deb
stable/main/binary-i386/libkonq3_2.2.2-14.8_i386.deb
stable/main/binary-i386/konqueror_2.2.2-14.8_i386.deb
stable/main/binary-i386/libkonq-dev_2.2.2-14.8_i386.deb
stable/main/binary-i386/kscreensaver_2.2.2-14.8_i386.deb
stable/main/binary-i386/konsole_2.2.2-14.8_i386.deb
stable/main/binary-i386/kdebase-audiolibs_2.2.2-14.8_i386.deb
stable/main/binary-i386/kate_2.2.2-14.8_i386.deb
kdebase (4:2.2.2-14.8) stable; urgency=medium
  * NMU to fix uninstallable konqueror security update packages on powerpc;
    urgency set accordingly.
  * Update debian/control to assert that konqueror replaces versions of
    kdebase-libs less than 4:2.2.2-14.2; the original woody version of
    konqueror for powerpc had a file,
    /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs
    for every other architecture, and in every subsequent security release.
    (Closes: #178507)


stable/main/binary-hppa/konqueror_2.2.2-14.8_hppa.deb
stable/main/binary-hppa/kate_2.2.2-14.8_hppa.deb
stable/main/binary-hppa/kscreensaver_2.2.2-14.8_hppa.deb
stable/main/binary-hppa/libkonq-dev_2.2.2-14.8_hppa.deb
stable/main/binary-hppa/konsole_2.2.2-14.8_hppa.deb
stable/main/binary-hppa/kdebase-audiolibs_2.2.2-14.8_hppa.deb
stable/main/binary-hppa/kdebase-libs_2.2.2-14.8_hppa.deb
stable/main/binary-hppa/kdebase-dev_2.2.2-14.8_hppa.deb
stable/main/binary-hppa/kdebase_2.2.2-14.8_hppa.deb
stable/main/binary-hppa/kdm_2.2.2-14.8_hppa.deb
stable/main/binary-hppa/libkonq3_2.2.2-14.8_hppa.deb
kdebase (4:2.2.2-14.8) stable; urgency=medium
  * NMU to fix uninstallable konqueror security update packages on powerpc;
    urgency set accordingly.
  * Update debian/control to assert that konqueror replaces versions of
    kdebase-libs less than 4:2.2.2-14.2; the original woody version of
    konqueror for powerpc had a file,
    /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs
    for every other architecture, and in every subsequent security release.
    (Closes: #178507)


stable/main/binary-arm/libkonq3_2.2.2-14.8_arm.deb
stable/main/binary-arm/konsole_2.2.2-14.8_arm.deb
stable/main/binary-arm/konqueror_2.2.2-14.8_arm.deb
stable/main/binary-arm/kdebase-libs_2.2.2-14.8_arm.deb
stable/main/binary-arm/kdebase-dev_2.2.2-14.8_arm.deb
stable/main/binary-arm/libkonq-dev_2.2.2-14.8_arm.deb
stable/main/binary-arm/kdm_2.2.2-14.8_arm.deb
stable/main/binary-arm/kdebase-audiolibs_2.2.2-14.8_arm.deb
stable/main/binary-arm/kdebase_2.2.2-14.8_arm.deb
stable/main/binary-arm/kscreensaver_2.2.2-14.8_arm.deb
stable/main/binary-arm/kate_2.2.2-14.8_arm.deb
kdebase (4:2.2.2-14.8) stable; urgency=medium
  * NMU to fix uninstallable konqueror security update packages on powerpc;
    urgency set accordingly.
  * Update debian/control to assert that konqueror replaces versions of
    kdebase-libs less than 4:2.2.2-14.2; the original woody version of
    konqueror for powerpc had a file,
    /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs
    for every other architecture, and in every subsequent security release.
    (Closes: #178507)


stable/main/binary-alpha/konsole_2.2.2-14.8_alpha.deb
stable/main/binary-alpha/kdebase-audiolibs_2.2.2-14.8_alpha.deb
stable/main/binary-alpha/kdebase_2.2.2-14.8_alpha.deb
stable/main/binary-alpha/kate_2.2.2-14.8_alpha.deb
stable/main/binary-alpha/kdebase-dev_2.2.2-14.8_alpha.deb
stable/main/binary-alpha/kdm_2.2.2-14.8_alpha.deb
stable/main/binary-alpha/kdebase-libs_2.2.2-14.8_alpha.deb
stable/main/binary-alpha/libkonq3_2.2.2-14.8_alpha.deb
stable/main/binary-alpha/libkonq-dev_2.2.2-14.8_alpha.deb
stable/main/binary-alpha/kscreensaver_2.2.2-14.8_alpha.deb
stable/main/binary-alpha/konqueror_2.2.2-14.8_alpha.deb
kdebase (4:2.2.2-14.8) stable; urgency=medium
  * NMU to fix uninstallable konqueror security update packages on powerpc;
    urgency set accordingly.
  * Update debian/control to assert that konqueror replaces versions of
    kdebase-libs less than 4:2.2.2-14.2; the original woody version of
    konqueror for powerpc had a file,
    /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs
    for every other architecture, and in every subsequent security release.
    (Closes: #178507)


stable/main/binary-powerpc/libkonq-dev_2.2.2-14.8_powerpc.deb
stable/main/source/kdebase_2.2.2-14.8.diff.gz
stable/main/binary-powerpc/kdebase-audiolibs_2.2.2-14.8_powerpc.deb
stable/main/binary-powerpc/kdebase-libs_2.2.2-14.8_powerpc.deb
stable/main/binary-powerpc/konqueror_2.2.2-14.8_powerpc.deb
stable/main/binary-powerpc/kdm_2.2.2-14.8_powerpc.deb
stable/main/binary-powerpc/kdebase_2.2.2-14.8_powerpc.deb
stable/main/binary-powerpc/libkonq3_2.2.2-14.8_powerpc.deb
stable/main/binary-powerpc/kdebase-dev_2.2.2-14.8_powerpc.deb
stable/main/binary-powerpc/kate_2.2.2-14.8_powerpc.deb
stable/main/binary-powerpc/kscreensaver_2.2.2-14.8_powerpc.deb
stable/main/binary-powerpc/konsole_2.2.2-14.8_powerpc.deb
stable/main/binary-all/kdebase-doc_2.2.2-14.8_all.deb
stable/main/binary-all/kdewallpapers_2.2.2-14.8_all.deb
stable/main/source/kdebase_2.2.2-14.8.dsc
kdebase (4:2.2.2-14.8) stable; urgency=medium
  * NMU to fix uninstallable konqueror security update packages on powerpc;
    urgency set accordingly.
  * Update debian/control to assert that konqueror replaces versions of
    kdebase-libs less than 4:2.2.2-14.2; the original woody version of
    konqueror for powerpc had a file,
    /usr/share/services/kded/favicons.desktop, that appeared in kdebase-libs
    for every other architecture, and in every subsequent security release.
    (Closes: #178507)


stable/main/binary-s390/secpolicy_2.2.2-7.2_s390.deb
stable/main/binary-s390/kwuftpd_2.2.2-7.2_s390.deb
stable/main/binary-s390/kcmlinuz_2.2.2-7.2_s390.deb
stable/main/binary-s390/kcron_2.2.2-7.2_s390.deb
stable/main/binary-s390/kpackage_2.2.2-7.2_s390.deb
stable/main/binary-s390/kuser_2.2.2-7.2_s390.deb
stable/main/binary-s390/ksysv_2.2.2-7.2_s390.deb
kdeadmin (4:2.2.2-7.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-powerpc/kpackage_2.2.2-7.2_powerpc.deb
stable/main/binary-powerpc/kcron_2.2.2-7.2_powerpc.deb
stable/main/binary-powerpc/kuser_2.2.2-7.2_powerpc.deb
stable/main/binary-powerpc/secpolicy_2.2.2-7.2_powerpc.deb
stable/main/binary-powerpc/ksysv_2.2.2-7.2_powerpc.deb
stable/main/binary-powerpc/kcmlinuz_2.2.2-7.2_powerpc.deb
stable/main/binary-powerpc/kwuftpd_2.2.2-7.2_powerpc.deb
kdeadmin (4:2.2.2-7.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mipsel/kcmlinuz_2.2.2-7.2_mipsel.deb
stable/main/binary-mipsel/kwuftpd_2.2.2-7.2_mipsel.deb
stable/main/binary-mipsel/secpolicy_2.2.2-7.2_mipsel.deb
stable/main/binary-mipsel/kpackage_2.2.2-7.2_mipsel.deb
stable/main/binary-mipsel/kuser_2.2.2-7.2_mipsel.deb
stable/main/binary-mipsel/ksysv_2.2.2-7.2_mipsel.deb
stable/main/binary-mipsel/kcron_2.2.2-7.2_mipsel.deb
kdeadmin (4:2.2.2-7.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mips/secpolicy_2.2.2-7.2_mips.deb
stable/main/binary-mips/kwuftpd_2.2.2-7.2_mips.deb
stable/main/binary-mips/kpackage_2.2.2-7.2_mips.deb
stable/main/binary-mips/kuser_2.2.2-7.2_mips.deb
stable/main/binary-mips/kcron_2.2.2-7.2_mips.deb
stable/main/binary-mips/kcmlinuz_2.2.2-7.2_mips.deb
stable/main/binary-mips/ksysv_2.2.2-7.2_mips.deb
kdeadmin (4:2.2.2-7.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-m68k/kcron_2.2.2-7.2_m68k.deb
stable/main/binary-m68k/kuser_2.2.2-7.2_m68k.deb
stable/main/binary-m68k/ksysv_2.2.2-7.2_m68k.deb
stable/main/binary-m68k/kcmlinuz_2.2.2-7.2_m68k.deb
stable/main/binary-m68k/kwuftpd_2.2.2-7.2_m68k.deb
stable/main/binary-m68k/secpolicy_2.2.2-7.2_m68k.deb
stable/main/binary-m68k/kpackage_2.2.2-7.2_m68k.deb
kdeadmin (4:2.2.2-7.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-ia64/kpackage_2.2.2-7.2_ia64.deb
stable/main/binary-ia64/secpolicy_2.2.2-7.2_ia64.deb
stable/main/binary-ia64/ksysv_2.2.2-7.2_ia64.deb
stable/main/binary-ia64/kcron_2.2.2-7.2_ia64.deb
stable/main/binary-ia64/kuser_2.2.2-7.2_ia64.deb
stable/main/binary-ia64/kcmlinuz_2.2.2-7.2_ia64.deb
stable/main/binary-ia64/kwuftpd_2.2.2-7.2_ia64.deb
kdeadmin (4:2.2.2-7.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-i386/kpackage_2.2.2-7.2_i386.deb
stable/main/binary-i386/kcmlinuz_2.2.2-7.2_i386.deb
stable/main/binary-i386/kwuftpd_2.2.2-7.2_i386.deb
stable/main/binary-i386/kuser_2.2.2-7.2_i386.deb
stable/main/binary-i386/secpolicy_2.2.2-7.2_i386.deb
stable/main/binary-i386/ksysv_2.2.2-7.2_i386.deb
stable/main/binary-i386/lilo-config_2.2.2-7.2_i386.deb
stable/main/binary-i386/kcron_2.2.2-7.2_i386.deb
kdeadmin (4:2.2.2-7.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-hppa/ksysv_2.2.2-7.2_hppa.deb
stable/main/binary-hppa/kcron_2.2.2-7.2_hppa.deb
stable/main/binary-hppa/secpolicy_2.2.2-7.2_hppa.deb
stable/main/binary-hppa/kwuftpd_2.2.2-7.2_hppa.deb
stable/main/binary-hppa/kcmlinuz_2.2.2-7.2_hppa.deb
stable/main/binary-hppa/kuser_2.2.2-7.2_hppa.deb
stable/main/binary-hppa/kpackage_2.2.2-7.2_hppa.deb
kdeadmin (4:2.2.2-7.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-arm/kcron_2.2.2-7.2_arm.deb
stable/main/binary-arm/kwuftpd_2.2.2-7.2_arm.deb
stable/main/binary-arm/kuser_2.2.2-7.2_arm.deb
stable/main/binary-arm/kcmlinuz_2.2.2-7.2_arm.deb
stable/main/binary-arm/ksysv_2.2.2-7.2_arm.deb
stable/main/binary-arm/secpolicy_2.2.2-7.2_arm.deb
stable/main/binary-arm/kpackage_2.2.2-7.2_arm.deb
kdeadmin (4:2.2.2-7.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-alpha/kwuftpd_2.2.2-7.2_alpha.deb
stable/main/binary-alpha/secpolicy_2.2.2-7.2_alpha.deb
stable/main/binary-alpha/kpackage_2.2.2-7.2_alpha.deb
stable/main/binary-alpha/kcmlinuz_2.2.2-7.2_alpha.deb
stable/main/binary-alpha/kuser_2.2.2-7.2_alpha.deb
stable/main/binary-alpha/kcron_2.2.2-7.2_alpha.deb
stable/main/binary-alpha/ksysv_2.2.2-7.2_alpha.deb
kdeadmin (4:2.2.2-7.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-sparc/ksysv_2.2.2-7.2_sparc.deb
stable/main/binary-sparc/kwuftpd_2.2.2-7.2_sparc.deb
stable/main/binary-sparc/kcmlinuz_2.2.2-7.2_sparc.deb
stable/main/source/kdeadmin_2.2.2-7.2.dsc
stable/main/binary-sparc/kuser_2.2.2-7.2_sparc.deb
stable/main/binary-sparc/kcron_2.2.2-7.2_sparc.deb
stable/main/binary-sparc/kpackage_2.2.2-7.2_sparc.deb
stable/main/binary-sparc/secpolicy_2.2.2-7.2_sparc.deb
stable/main/source/kdeadmin_2.2.2-7.2.diff.gz
kdeadmin (4:2.2.2-7.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-all/junior-puzzle_1.1woody1_all.deb
stable/main/source/junior-puzzle_1.1woody1.dsc
stable/main/source/junior-puzzle_1.1woody1.tar.gz
junior-puzzle (1.1woody1) stable; urgency=medium
  * Removed rocks-n-diamonds, which has been removed from woody and has no
    suitable replacement.


stable/main/binary-sparc/jitterbug_1.6.2-4.2woody2_sparc.deb
jitterbug (1.6.2-4.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Added build dependencies
  * Protection against insecure command execution. (CAN-2004-0028)


stable/main/binary-s390/jitterbug_1.6.2-4.2woody2_s390.deb
jitterbug (1.6.2-4.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Added build dependencies
  * Protection against insecure command execution. (CAN-2004-0028)


stable/main/binary-powerpc/jitterbug_1.6.2-4.2woody2_powerpc.deb
jitterbug (1.6.2-4.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Added build dependencies
  * Protection against insecure command execution. (CAN-2004-0028)


stable/main/binary-mipsel/jitterbug_1.6.2-4.2woody2_mipsel.deb
jitterbug (1.6.2-4.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Added build dependencies
  * Protection against insecure command execution. (CAN-2004-0028)


stable/main/binary-mips/jitterbug_1.6.2-4.2woody2_mips.deb
jitterbug (1.6.2-4.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Added build dependencies
  * Protection against insecure command execution. (CAN-2004-0028)


stable/main/binary-m68k/jitterbug_1.6.2-4.2woody2_m68k.deb
jitterbug (1.6.2-4.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Added build dependencies
  * Protection against insecure command execution. (CAN-2004-0028)


stable/main/binary-ia64/jitterbug_1.6.2-4.2woody2_ia64.deb
jitterbug (1.6.2-4.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Added build dependencies
  * Protection against insecure command execution. (CAN-2004-0028)


stable/main/binary-hppa/jitterbug_1.6.2-4.2woody2_hppa.deb
jitterbug (1.6.2-4.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Added build dependencies
  * Protection against insecure command execution. (CAN-2004-0028)


stable/main/binary-arm/jitterbug_1.6.2-4.2woody2_arm.deb
jitterbug (1.6.2-4.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Added build dependencies
  * Protection against insecure command execution. (CAN-2004-0028)


stable/main/binary-alpha/jitterbug_1.6.2-4.2woody2_alpha.deb
jitterbug (1.6.2-4.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Added build dependencies
  * Protection against insecure command execution. (CAN-2004-0028)


stable/main/binary-i386/jitterbug_1.6.2-4.2woody2_i386.deb
stable/main/source/jitterbug_1.6.2-4.2woody2.diff.gz
stable/main/source/jitterbug_1.6.2-4.2woody2.dsc
jitterbug (1.6.2-4.2woody2) stable-security; urgency=high
  * Non-maintainer upload by the security team.
  * Added build dependencies
  * Protection against insecure command execution. (CAN-2004-0028)


stable/main/binary-sparc/jftpgw_0.13.1-1woody1_sparc.deb
jftpgw (0.13.1-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in log() (CAN-2004-0448)


stable/main/binary-s390/jftpgw_0.13.1-1woody1_s390.deb
jftpgw (0.13.1-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in log() (CAN-2004-0448)


stable/main/binary-powerpc/jftpgw_0.13.1-1woody1_powerpc.deb
jftpgw (0.13.1-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in log() (CAN-2004-0448)


stable/main/binary-mipsel/jftpgw_0.13.1-1woody1_mipsel.deb
jftpgw (0.13.1-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in log() (CAN-2004-0448)


stable/main/binary-mips/jftpgw_0.13.1-1woody1_mips.deb
jftpgw (0.13.1-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in log() (CAN-2004-0448)


stable/main/binary-m68k/jftpgw_0.13.1-1woody1_m68k.deb
jftpgw (0.13.1-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in log() (CAN-2004-0448)


stable/main/binary-ia64/jftpgw_0.13.1-1woody1_ia64.deb
jftpgw (0.13.1-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in log() (CAN-2004-0448)


stable/main/binary-hppa/jftpgw_0.13.1-1woody1_hppa.deb
jftpgw (0.13.1-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in log() (CAN-2004-0448)


stable/main/binary-arm/jftpgw_0.13.1-1woody1_arm.deb
jftpgw (0.13.1-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in log() (CAN-2004-0448)


stable/main/binary-alpha/jftpgw_0.13.1-1woody1_alpha.deb
jftpgw (0.13.1-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in log() (CAN-2004-0448)


stable/main/source/jftpgw_0.13.1-1woody1.diff.gz
stable/main/binary-i386/jftpgw_0.13.1-1woody1_i386.deb
stable/main/source/jftpgw_0.13.1-1woody1.dsc
jftpgw (0.13.1-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix format string vulnerability in log() (CAN-2004-0448)


stable/main/binary-sparc/iptables_1.2.6a-5.0woody1_sparc.deb
stable/main/binary-sparc/iptables-dev_1.2.6a-5.0woody1_sparc.deb
iptables (1.2.6a-5.0woody1) stable; urgency=high
  * removed extra space character from the init script. The bug causes
    ruleset save failures and can silently truncate exisiting rulesets
    to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805)
  * removed an init script typo, s/Savinging/Saving/


stable/main/binary-s390/iptables_1.2.6a-5.0woody1_s390.deb
stable/main/binary-s390/iptables-dev_1.2.6a-5.0woody1_s390.deb
iptables (1.2.6a-5.0woody1) stable; urgency=high
  * removed extra space character from the init script. The bug causes
    ruleset save failures and can silently truncate exisiting rulesets
    to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805)
  * removed an init script typo, s/Savinging/Saving/


stable/main/binary-powerpc/iptables_1.2.6a-5.0woody1_powerpc.deb
stable/main/binary-powerpc/iptables-dev_1.2.6a-5.0woody1_powerpc.deb
iptables (1.2.6a-5.0woody1) stable; urgency=high
  * removed extra space character from the init script. The bug causes
    ruleset save failures and can silently truncate exisiting rulesets
    to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805)
  * removed an init script typo, s/Savinging/Saving/


stable/main/binary-mipsel/iptables_1.2.6a-5.0woody1_mipsel.deb
stable/main/binary-mipsel/iptables-dev_1.2.6a-5.0woody1_mipsel.deb
iptables (1.2.6a-5.0woody1) stable; urgency=high
  * removed extra space character from the init script. The bug causes
    ruleset save failures and can silently truncate exisiting rulesets
    to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805)
  * removed an init script typo, s/Savinging/Saving/


stable/main/binary-mips/iptables_1.2.6a-5.0woody1_mips.deb
stable/main/binary-mips/iptables-dev_1.2.6a-5.0woody1_mips.deb
iptables (1.2.6a-5.0woody1) stable; urgency=high
  * removed extra space character from the init script. The bug causes
    ruleset save failures and can silently truncate exisiting rulesets
    to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805)
  * removed an init script typo, s/Savinging/Saving/


stable/main/binary-m68k/iptables-dev_1.2.6a-5.0woody1_m68k.deb
stable/main/binary-m68k/iptables_1.2.6a-5.0woody1_m68k.deb
iptables (1.2.6a-5.0woody1) stable; urgency=high
  * removed extra space character from the init script. The bug causes
    ruleset save failures and can silently truncate exisiting rulesets
    to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805)
  * removed an init script typo, s/Savinging/Saving/


stable/main/binary-ia64/iptables_1.2.6a-5.0woody1_ia64.deb
stable/main/binary-ia64/iptables-dev_1.2.6a-5.0woody1_ia64.deb
iptables (1.2.6a-5.0woody1) stable; urgency=high
  * removed extra space character from the init script. The bug causes
    ruleset save failures and can silently truncate exisiting rulesets
    to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805)
  * removed an init script typo, s/Savinging/Saving/


stable/main/binary-hppa/iptables_1.2.6a-5.0woody1_hppa.deb
stable/main/binary-hppa/iptables-dev_1.2.6a-5.0woody1_hppa.deb
iptables (1.2.6a-5.0woody1) stable; urgency=high
  * removed extra space character from the init script. The bug causes
    ruleset save failures and can silently truncate exisiting rulesets
    to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805)
  * removed an init script typo, s/Savinging/Saving/


stable/main/binary-arm/iptables-dev_1.2.6a-5.0woody1_arm.deb
stable/main/binary-arm/iptables_1.2.6a-5.0woody1_arm.deb
iptables (1.2.6a-5.0woody1) stable; urgency=high
  * removed extra space character from the init script. The bug causes
    ruleset save failures and can silently truncate exisiting rulesets
    to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805)
  * removed an init script typo, s/Savinging/Saving/


stable/main/binary-alpha/iptables-dev_1.2.6a-5.0woody1_alpha.deb
stable/main/binary-alpha/iptables_1.2.6a-5.0woody1_alpha.deb
iptables (1.2.6a-5.0woody1) stable; urgency=high
  * removed extra space character from the init script. The bug causes
    ruleset save failures and can silently truncate exisiting rulesets
    to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805)
  * removed an init script typo, s/Savinging/Saving/


stable/main/binary-i386/iptables-dev_1.2.6a-5.0woody1_i386.deb
stable/main/source/iptables_1.2.6a-5.0woody1.diff.gz
stable/main/binary-i386/iptables_1.2.6a-5.0woody1_i386.deb
stable/main/source/iptables_1.2.6a-5.0woody1.dsc
iptables (1.2.6a-5.0woody1) stable; urgency=high
  * removed extra space character from the init script. The bug causes
    ruleset save failures and can silently truncate exisiting rulesets
    to zero bytes. Reported by Jan Minar. Thanks. (closes: Bug#225805)
  * removed an init script typo, s/Savinging/Saving/


stable/main/binary-sparc/iproute_20010824-8woody1_sparc.deb
iproute (20010824-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix DoS via spoofed netlink messages (CAN-2003-0856)


stable/main/binary-s390/iproute_20010824-8woody1_s390.deb
iproute (20010824-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix DoS via spoofed netlink messages (CAN-2003-0856)


stable/main/binary-powerpc/iproute_20010824-8woody1_powerpc.deb
iproute (20010824-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix DoS via spoofed netlink messages (CAN-2003-0856)


stable/main/binary-mipsel/iproute_20010824-8woody1_mipsel.deb
iproute (20010824-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix DoS via spoofed netlink messages (CAN-2003-0856)


stable/main/binary-mips/iproute_20010824-8woody1_mips.deb
iproute (20010824-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix DoS via spoofed netlink messages (CAN-2003-0856)


stable/main/binary-m68k/iproute_20010824-8woody1_m68k.deb
iproute (20010824-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix DoS via spoofed netlink messages (CAN-2003-0856)


stable/main/binary-ia64/iproute_20010824-8woody1_ia64.deb
iproute (20010824-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix DoS via spoofed netlink messages (CAN-2003-0856)


stable/main/binary-hppa/iproute_20010824-8woody1_hppa.deb
iproute (20010824-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix DoS via spoofed netlink messages (CAN-2003-0856)


stable/main/binary-arm/iproute_20010824-8woody1_arm.deb
iproute (20010824-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix DoS via spoofed netlink messages (CAN-2003-0856)


stable/main/binary-alpha/iproute_20010824-8woody1_alpha.deb
iproute (20010824-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix DoS via spoofed netlink messages (CAN-2003-0856)


stable/main/source/iproute_20010824-8woody1.dsc
stable/main/binary-i386/iproute_20010824-8woody1_i386.deb
stable/main/source/iproute_20010824-8woody1.diff.gz
iproute (20010824-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix DoS via spoofed netlink messages (CAN-2003-0856)


stable/main/source/ipmasq_3.5.10d.dsc
stable/main/binary-all/ipmasq_3.5.10d_all.deb
stable/main/source/ipmasq_3.5.10d.tar.gz
ipmasq (3.5.10d) stable; urgency=low
  * Fix wrong iptables path in rules-down/A02masqmethod.def to avoid
    gross functionality bug and unlikely security concerns after
    pulling down rule by the /etc/ipmasq/rules-down.  (closes: #162647)


stable/main/binary-sparc/libapache-mod-interchange_4.8.3.20020306-1.woody.2_sparc.deb
stable/main/binary-sparc/interchange_4.8.3.20020306-1.woody.2_sparc.deb
interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high
  * fixed exposal of arbitrary variable contents by using an URL like
    http://shop.example.com/cgi-bin/store/__SQLUSER__
    (Closes: #240800, CAN-2004-0374)


stable/main/binary-s390/interchange_4.8.3.20020306-1.woody.2_s390.deb
stable/main/binary-s390/libapache-mod-interchange_4.8.3.20020306-1.woody.2_s390.deb
interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high
  * fixed exposal of arbitrary variable contents by using an URL like
    http://shop.example.com/cgi-bin/store/__SQLUSER__
    (Closes: #240800, CAN-2004-0374)


stable/main/binary-powerpc/libapache-mod-interchange_4.8.3.20020306-1.woody.2_powerpc.deb
stable/main/binary-powerpc/interchange_4.8.3.20020306-1.woody.2_powerpc.deb
interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high
  * fixed exposal of arbitrary variable contents by using an URL like
    http://shop.example.com/cgi-bin/store/__SQLUSER__
    (Closes: #240800, CAN-2004-0374)


stable/main/binary-mipsel/libapache-mod-interchange_4.8.3.20020306-1.woody.2_mipsel.deb
stable/main/binary-mipsel/interchange_4.8.3.20020306-1.woody.2_mipsel.deb
interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high
  * fixed exposal of arbitrary variable contents by using an URL like
    http://shop.example.com/cgi-bin/store/__SQLUSER__
    (Closes: #240800, CAN-2004-0374)


stable/main/binary-mips/interchange_4.8.3.20020306-1.woody.2_mips.deb
stable/main/binary-mips/libapache-mod-interchange_4.8.3.20020306-1.woody.2_mips.deb
interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high
  * fixed exposal of arbitrary variable contents by using an URL like
    http://shop.example.com/cgi-bin/store/__SQLUSER__
    (Closes: #240800, CAN-2004-0374)


stable/main/binary-m68k/libapache-mod-interchange_4.8.3.20020306-1.woody.2_m68k.deb
stable/main/binary-m68k/interchange_4.8.3.20020306-1.woody.2_m68k.deb
interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high
  * fixed exposal of arbitrary variable contents by using an URL like
    http://shop.example.com/cgi-bin/store/__SQLUSER__
    (Closes: #240800, CAN-2004-0374)


stable/main/binary-ia64/libapache-mod-interchange_4.8.3.20020306-1.woody.2_ia64.deb
stable/main/binary-ia64/interchange_4.8.3.20020306-1.woody.2_ia64.deb
interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high
  * fixed exposal of arbitrary variable contents by using an URL like
    http://shop.example.com/cgi-bin/store/__SQLUSER__
    (Closes: #240800, CAN-2004-0374)


stable/main/binary-hppa/interchange_4.8.3.20020306-1.woody.2_hppa.deb
stable/main/binary-hppa/libapache-mod-interchange_4.8.3.20020306-1.woody.2_hppa.deb
interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high
  * fixed exposal of arbitrary variable contents by using an URL like
    http://shop.example.com/cgi-bin/store/__SQLUSER__
    (Closes: #240800, CAN-2004-0374)


stable/main/binary-arm/interchange_4.8.3.20020306-1.woody.2_arm.deb
stable/main/binary-arm/libapache-mod-interchange_4.8.3.20020306-1.woody.2_arm.deb
interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high
  * fixed exposal of arbitrary variable contents by using an URL like
    http://shop.example.com/cgi-bin/store/__SQLUSER__
    (Closes: #240800, CAN-2004-0374)


stable/main/binary-alpha/interchange_4.8.3.20020306-1.woody.2_alpha.deb
stable/main/binary-alpha/libapache-mod-interchange_4.8.3.20020306-1.woody.2_alpha.deb
interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high
  * fixed exposal of arbitrary variable contents by using an URL like
    http://shop.example.com/cgi-bin/store/__SQLUSER__
    (Closes: #240800, CAN-2004-0374)


stable/main/binary-all/interchange-cat-foundation_4.8.3.20020306-1.woody.2_all.deb
stable/main/source/interchange_4.8.3.20020306-1.woody.2.diff.gz
stable/main/binary-i386/libapache-mod-interchange_4.8.3.20020306-1.woody.2_i386.deb
stable/main/binary-i386/interchange_4.8.3.20020306-1.woody.2_i386.deb
stable/main/source/interchange_4.8.3.20020306-1.woody.2.dsc
stable/main/binary-all/interchange-ui_4.8.3.20020306-1.woody.2_all.deb
interchange (4.8.3.20020306-1.woody.2) stable-security; urgency=high
  * fixed exposal of arbitrary variable contents by using an URL like
    http://shop.example.com/cgi-bin/store/__SQLUSER__
    (Closes: #240800, CAN-2004-0374)


stable/main/binary-sparc/libimlib2_1.0.5-2woody1_sparc.deb
stable/main/binary-sparc/libimlib2-dev_1.0.5-2woody1_sparc.deb
imlib2 (1.0.5-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix heap
    overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802]


stable/main/binary-s390/libimlib2-dev_1.0.5-2woody1_s390.deb
stable/main/binary-s390/libimlib2_1.0.5-2woody1_s390.deb
imlib2 (1.0.5-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix heap
    overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802]


stable/main/binary-powerpc/libimlib2_1.0.5-2woody1_powerpc.deb
stable/main/binary-powerpc/libimlib2-dev_1.0.5-2woody1_powerpc.deb
imlib2 (1.0.5-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix heap
    overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802]


stable/main/binary-mipsel/libimlib2-dev_1.0.5-2woody1_mipsel.deb
stable/main/binary-mipsel/libimlib2_1.0.5-2woody1_mipsel.deb
imlib2 (1.0.5-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix heap
    overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802]


stable/main/binary-mips/libimlib2-dev_1.0.5-2woody1_mips.deb
stable/main/binary-mips/libimlib2_1.0.5-2woody1_mips.deb
imlib2 (1.0.5-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix heap
    overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802]


stable/main/binary-m68k/libimlib2_1.0.5-2woody1_m68k.deb
stable/main/binary-m68k/libimlib2-dev_1.0.5-2woody1_m68k.deb
imlib2 (1.0.5-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix heap
    overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802]


stable/main/binary-ia64/libimlib2-dev_1.0.5-2woody1_ia64.deb
stable/main/binary-ia64/libimlib2_1.0.5-2woody1_ia64.deb
imlib2 (1.0.5-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix heap
    overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802]


stable/main/binary-i386/libimlib2_1.0.5-2woody1_i386.deb
stable/main/binary-i386/libimlib2-dev_1.0.5-2woody1_i386.deb
imlib2 (1.0.5-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix heap
    overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802]


stable/main/binary-arm/libimlib2-dev_1.0.5-2woody1_arm.deb
stable/main/binary-arm/libimlib2_1.0.5-2woody1_arm.deb
imlib2 (1.0.5-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix heap
    overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802]


stable/main/binary-alpha/libimlib2-dev_1.0.5-2woody1_alpha.deb
stable/main/binary-alpha/libimlib2_1.0.5-2woody1_alpha.deb
imlib2 (1.0.5-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix heap
    overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802]


stable/main/source/imlib2_1.0.5-2woody1.diff.gz
stable/main/binary-hppa/libimlib2-dev_1.0.5-2woody1_hppa.deb
stable/main/source/imlib2_1.0.5-2woody1.dsc
stable/main/binary-hppa/libimlib2_1.0.5-2woody1_hppa.deb
imlib2 (1.0.5-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Securty Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix heap
    overflow in BMP handling [loaders/loader_bmp.c, CAN-2004-0802]


stable/main/binary-sparc/imlib-dev_1.9.14-2wody1_sparc.deb
stable/main/binary-sparc/gdk-imlib-dev_1.9.14-2wody1_sparc.deb
stable/main/binary-sparc/imlib1_1.9.14-2wody1_sparc.deb
stable/main/binary-sparc/imlib-progs_1.9.14-2wody1_sparc.deb
stable/main/binary-sparc/gdk-imlib1_1.9.14-2wody1_sparc.deb
imlib (1.9.14-2wody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix arbitrary
    code execution through a heap overflow [gdk_imlib/io-bmp.c,
    CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034]


stable/main/binary-s390/imlib-dev_1.9.14-2wody1_s390.deb
stable/main/binary-s390/imlib1_1.9.14-2wody1_s390.deb
stable/main/binary-s390/imlib-progs_1.9.14-2wody1_s390.deb
stable/main/binary-s390/gdk-imlib1_1.9.14-2wody1_s390.deb
stable/main/binary-s390/gdk-imlib-dev_1.9.14-2wody1_s390.deb
imlib (1.9.14-2wody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix arbitrary
    code execution through a heap overflow [gdk_imlib/io-bmp.c,
    CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034]


stable/main/binary-powerpc/imlib-progs_1.9.14-2wody1_powerpc.deb
stable/main/binary-powerpc/imlib-dev_1.9.14-2wody1_powerpc.deb
stable/main/binary-powerpc/gdk-imlib1_1.9.14-2wody1_powerpc.deb
stable/main/binary-powerpc/imlib1_1.9.14-2wody1_powerpc.deb
stable/main/binary-powerpc/gdk-imlib-dev_1.9.14-2wody1_powerpc.deb
imlib (1.9.14-2wody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix arbitrary
    code execution through a heap overflow [gdk_imlib/io-bmp.c,
    CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034]


stable/main/binary-mipsel/gdk-imlib1_1.9.14-2wody1_mipsel.deb
stable/main/binary-mipsel/imlib-progs_1.9.14-2wody1_mipsel.deb
stable/main/binary-mipsel/imlib1_1.9.14-2wody1_mipsel.deb
stable/main/binary-mipsel/gdk-imlib-dev_1.9.14-2wody1_mipsel.deb
stable/main/binary-mipsel/imlib-dev_1.9.14-2wody1_mipsel.deb
imlib (1.9.14-2wody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix arbitrary
    code execution through a heap overflow [gdk_imlib/io-bmp.c,
    CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034]


stable/main/binary-mips/imlib-progs_1.9.14-2wody1_mips.deb
stable/main/binary-mips/imlib-dev_1.9.14-2wody1_mips.deb
stable/main/binary-mips/gdk-imlib1_1.9.14-2wody1_mips.deb
stable/main/binary-mips/imlib1_1.9.14-2wody1_mips.deb
stable/main/binary-mips/gdk-imlib-dev_1.9.14-2wody1_mips.deb
imlib (1.9.14-2wody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix arbitrary
    code execution through a heap overflow [gdk_imlib/io-bmp.c,
    CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034]


stable/main/binary-m68k/imlib1_1.9.14-2wody1_m68k.deb
stable/main/binary-m68k/imlib-progs_1.9.14-2wody1_m68k.deb
stable/main/binary-m68k/imlib-dev_1.9.14-2wody1_m68k.deb
stable/main/binary-m68k/gdk-imlib1_1.9.14-2wody1_m68k.deb
stable/main/binary-m68k/gdk-imlib-dev_1.9.14-2wody1_m68k.deb
imlib (1.9.14-2wody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix arbitrary
    code execution through a heap overflow [gdk_imlib/io-bmp.c,
    CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034]


stable/main/binary-ia64/gdk-imlib1_1.9.14-2wody1_ia64.deb
stable/main/binary-ia64/imlib-progs_1.9.14-2wody1_ia64.deb
stable/main/binary-ia64/gdk-imlib-dev_1.9.14-2wody1_ia64.deb
stable/main/binary-ia64/imlib-dev_1.9.14-2wody1_ia64.deb
stable/main/binary-ia64/imlib1_1.9.14-2wody1_ia64.deb
imlib (1.9.14-2wody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix arbitrary
    code execution through a heap overflow [gdk_imlib/io-bmp.c,
    CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034]


stable/main/binary-i386/imlib1_1.9.14-2wody1_i386.deb
stable/main/binary-i386/gdk-imlib1_1.9.14-2wody1_i386.deb
stable/main/binary-i386/gdk-imlib-dev_1.9.14-2wody1_i386.deb
stable/main/binary-i386/imlib-progs_1.9.14-2wody1_i386.deb
stable/main/binary-i386/imlib-dev_1.9.14-2wody1_i386.deb
imlib (1.9.14-2wody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix arbitrary
    code execution through a heap overflow [gdk_imlib/io-bmp.c,
    CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034]


stable/main/binary-arm/imlib1_1.9.14-2wody1_arm.deb
stable/main/binary-arm/gdk-imlib-dev_1.9.14-2wody1_arm.deb
stable/main/binary-arm/imlib-progs_1.9.14-2wody1_arm.deb
stable/main/binary-arm/gdk-imlib1_1.9.14-2wody1_arm.deb
stable/main/binary-arm/imlib-dev_1.9.14-2wody1_arm.deb
imlib (1.9.14-2wody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix arbitrary
    code execution through a heap overflow [gdk_imlib/io-bmp.c,
    CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034]


stable/main/binary-alpha/gdk-imlib-dev_1.9.14-2wody1_alpha.deb
stable/main/binary-alpha/imlib-dev_1.9.14-2wody1_alpha.deb
stable/main/binary-alpha/imlib1_1.9.14-2wody1_alpha.deb
stable/main/binary-alpha/gdk-imlib1_1.9.14-2wody1_alpha.deb
stable/main/binary-alpha/imlib-progs_1.9.14-2wody1_alpha.deb
imlib (1.9.14-2wody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix arbitrary
    code execution through a heap overflow [gdk_imlib/io-bmp.c,
    CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034]


stable/main/binary-hppa/gdk-imlib-dev_1.9.14-2wody1_hppa.deb
stable/main/source/imlib_1.9.14-2wody1.diff.gz
stable/main/binary-hppa/gdk-imlib1_1.9.14-2wody1_hppa.deb
stable/main/binary-all/imlib-base_1.9.14-2wody1_all.deb
stable/main/binary-hppa/imlib-dev_1.9.14-2wody1_hppa.deb
stable/main/source/imlib_1.9.14-2wody1.dsc
stable/main/binary-hppa/imlib1_1.9.14-2wody1_hppa.deb
stable/main/binary-hppa/imlib-progs_1.9.14-2wody1_hppa.deb
imlib (1.9.14-2wody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Marcus Meissner <meissner@suse.de> to fix arbitrary
    code execution through a heap overflow [gdk_imlib/io-bmp.c,
    CAN-2004-0817, http://bugzilla.gnome.org/show_bug.cgi?id=151034]


stable/main/binary-sparc/ident2_1.03-3woody1_sparc.deb
ident2 (1.03-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Extend buffer in child_service by 2 bytes to prevent small overflow
    (CAN-2004-0408)


stable/main/binary-s390/ident2_1.03-3woody1_s390.deb
ident2 (1.03-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Extend buffer in child_service by 2 bytes to prevent small overflow
    (CAN-2004-0408)


stable/main/binary-powerpc/ident2_1.03-3woody1_powerpc.deb
ident2 (1.03-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Extend buffer in child_service by 2 bytes to prevent small overflow
    (CAN-2004-0408)


stable/main/binary-mipsel/ident2_1.03-3woody1_mipsel.deb
ident2 (1.03-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Extend buffer in child_service by 2 bytes to prevent small overflow
    (CAN-2004-0408)


stable/main/binary-mips/ident2_1.03-3woody1_mips.deb
ident2 (1.03-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Extend buffer in child_service by 2 bytes to prevent small overflow
    (CAN-2004-0408)


stable/main/binary-m68k/ident2_1.03-3woody1_m68k.deb
ident2 (1.03-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Extend buffer in child_service by 2 bytes to prevent small overflow
    (CAN-2004-0408)


stable/main/binary-ia64/ident2_1.03-3woody1_ia64.deb
ident2 (1.03-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Extend buffer in child_service by 2 bytes to prevent small overflow
    (CAN-2004-0408)


stable/main/binary-hppa/ident2_1.03-3woody1_hppa.deb
ident2 (1.03-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Extend buffer in child_service by 2 bytes to prevent small overflow
    (CAN-2004-0408)


stable/main/binary-arm/ident2_1.03-3woody1_arm.deb
ident2 (1.03-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Extend buffer in child_service by 2 bytes to prevent small overflow
    (CAN-2004-0408)


stable/main/binary-alpha/ident2_1.03-3woody1_alpha.deb
ident2 (1.03-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Extend buffer in child_service by 2 bytes to prevent small overflow
    (CAN-2004-0408)


stable/main/source/ident2_1.03-3woody1.dsc
stable/main/source/ident2_1.03-3woody1.diff.gz
stable/main/binary-i386/ident2_1.03-3woody1_i386.deb
ident2 (1.03-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Extend buffer in child_service by 2 bytes to prevent small overflow
    (CAN-2004-0408)


stable/main/binary-sparc/icecast-server_1.3.11-4.2_sparc.deb
icecast-server (1:1.3.11-4.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Emmanuel le Chevoir to fix cross site scripting
    problem discovered by Markus Wörle [src/http.c, src/http.h,
    CAN-2004-0781]


stable/main/binary-s390/icecast-server_1.3.11-4.2_s390.deb
icecast-server (1:1.3.11-4.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Emmanuel le Chevoir to fix cross site scripting
    problem discovered by Markus Wörle [src/http.c, src/http.h,
    CAN-2004-0781]


stable/main/binary-powerpc/icecast-server_1.3.11-4.2_powerpc.deb
icecast-server (1:1.3.11-4.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Emmanuel le Chevoir to fix cross site scripting
    problem discovered by Markus Wörle [src/http.c, src/http.h,
    CAN-2004-0781]


stable/main/binary-mipsel/icecast-server_1.3.11-4.2_mipsel.deb
icecast-server (1:1.3.11-4.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Emmanuel le Chevoir to fix cross site scripting
    problem discovered by Markus Wörle [src/http.c, src/http.h,
    CAN-2004-0781]


stable/main/binary-mips/icecast-server_1.3.11-4.2_mips.deb
icecast-server (1:1.3.11-4.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Emmanuel le Chevoir to fix cross site scripting
    problem discovered by Markus Wörle [src/http.c, src/http.h,
    CAN-2004-0781]


stable/main/binary-m68k/icecast-server_1.3.11-4.2_m68k.deb
icecast-server (1:1.3.11-4.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Emmanuel le Chevoir to fix cross site scripting
    problem discovered by Markus Wörle [src/http.c, src/http.h,
    CAN-2004-0781]


stable/main/binary-ia64/icecast-server_1.3.11-4.2_ia64.deb
icecast-server (1:1.3.11-4.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Emmanuel le Chevoir to fix cross site scripting
    problem discovered by Markus Wörle [src/http.c, src/http.h,
    CAN-2004-0781]


stable/main/binary-i386/icecast-server_1.3.11-4.2_i386.deb
icecast-server (1:1.3.11-4.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Emmanuel le Chevoir to fix cross site scripting
    problem discovered by Markus Wörle [src/http.c, src/http.h,
    CAN-2004-0781]


stable/main/binary-hppa/icecast-server_1.3.11-4.2_hppa.deb
icecast-server (1:1.3.11-4.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Emmanuel le Chevoir to fix cross site scripting
    problem discovered by Markus Wörle [src/http.c, src/http.h,
    CAN-2004-0781]


stable/main/binary-arm/icecast-server_1.3.11-4.2_arm.deb
icecast-server (1:1.3.11-4.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Emmanuel le Chevoir to fix cross site scripting
    problem discovered by Markus Wörle [src/http.c, src/http.h,
    CAN-2004-0781]


stable/main/binary-alpha/icecast-server_1.3.11-4.2_alpha.deb
stable/main/source/icecast-server_1.3.11-4.2.tar.gz
stable/main/source/icecast-server_1.3.11-4.2.dsc
icecast-server (1:1.3.11-4.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Emmanuel le Chevoir to fix cross site scripting
    problem discovered by Markus Wörle [src/http.c, src/http.h,
    CAN-2004-0781]


stable/main/binary-sparc/hztty_2.0-5.2woody1_sparc.deb
hztty (2.0-5.2woody1) stable-security; urgency=low
  * Fix buffer overflows in io.c.  Thanks to Jens Steube for the security
    analysis and fix. (CAN-2003-0783)
  * hztty should have been setgid utmp, not setuid root, ever since the
    release of Standards-Version: 3.0.0.  My apologies for the oversight.


stable/main/binary-s390/hztty_2.0-5.2woody1_s390.deb
hztty (2.0-5.2woody1) stable-security; urgency=low
  * Fix buffer overflows in io.c.  Thanks to Jens Steube for the security
    analysis and fix. (CAN-2003-0783)
  * hztty should have been setgid utmp, not setuid root, ever since the
    release of Standards-Version: 3.0.0.  My apologies for the oversight.


stable/main/binary-powerpc/hztty_2.0-5.2woody1_powerpc.deb
hztty (2.0-5.2woody1) stable-security; urgency=low
  * Fix buffer overflows in io.c.  Thanks to Jens Steube for the security
    analysis and fix. (CAN-2003-0783)
  * hztty should have been setgid utmp, not setuid root, ever since the
    release of Standards-Version: 3.0.0.  My apologies for the oversight.


stable/main/binary-mipsel/hztty_2.0-5.2woody1_mipsel.deb
hztty (2.0-5.2woody1) stable-security; urgency=low
  * Fix buffer overflows in io.c.  Thanks to Jens Steube for the security
    analysis and fix. (CAN-2003-0783)
  * hztty should have been setgid utmp, not setuid root, ever since the
    release of Standards-Version: 3.0.0.  My apologies for the oversight.


stable/main/binary-mips/hztty_2.0-5.2woody1_mips.deb
hztty (2.0-5.2woody1) stable-security; urgency=low
  * Fix buffer overflows in io.c.  Thanks to Jens Steube for the security
    analysis and fix. (CAN-2003-0783)
  * hztty should have been setgid utmp, not setuid root, ever since the
    release of Standards-Version: 3.0.0.  My apologies for the oversight.


stable/main/binary-m68k/hztty_2.0-5.2woody1_m68k.deb
hztty (2.0-5.2woody1) stable-security; urgency=low
  * Fix buffer overflows in io.c.  Thanks to Jens Steube for the security
    analysis and fix. (CAN-2003-0783)
  * hztty should have been setgid utmp, not setuid root, ever since the
    release of Standards-Version: 3.0.0.  My apologies for the oversight.


stable/main/binary-ia64/hztty_2.0-5.2woody1_ia64.deb
hztty (2.0-5.2woody1) stable-security; urgency=low
  * Fix buffer overflows in io.c.  Thanks to Jens Steube for the security
    analysis and fix. (CAN-2003-0783)
  * hztty should have been setgid utmp, not setuid root, ever since the
    release of Standards-Version: 3.0.0.  My apologies for the oversight.


stable/main/binary-hppa/hztty_2.0-5.2woody1_hppa.deb
hztty (2.0-5.2woody1) stable-security; urgency=low
  * Fix buffer overflows in io.c.  Thanks to Jens Steube for the security
    analysis and fix. (CAN-2003-0783)
  * hztty should have been setgid utmp, not setuid root, ever since the
    release of Standards-Version: 3.0.0.  My apologies for the oversight.


stable/main/binary-arm/hztty_2.0-5.2woody1_arm.deb
hztty (2.0-5.2woody1) stable-security; urgency=low
  * Fix buffer overflows in io.c.  Thanks to Jens Steube for the security
    analysis and fix. (CAN-2003-0783)
  * hztty should have been setgid utmp, not setuid root, ever since the
    release of Standards-Version: 3.0.0.  My apologies for the oversight.


stable/main/binary-alpha/hztty_2.0-5.2woody1_alpha.deb
hztty (2.0-5.2woody1) stable-security; urgency=low
  * Fix buffer overflows in io.c.  Thanks to Jens Steube for the security
    analysis and fix. (CAN-2003-0783)
  * hztty should have been setgid utmp, not setuid root, ever since the
    release of Standards-Version: 3.0.0.  My apologies for the oversight.


stable/main/source/hztty_2.0-5.2woody1.dsc
stable/main/binary-i386/hztty_2.0-5.2woody1_i386.deb
stable/main/source/hztty_2.0-5.2woody1.diff.gz
hztty (2.0-5.2woody1) stable-security; urgency=low
  * Fix buffer overflows in io.c.  Thanks to Jens Steube for the security
    analysis and fix. (CAN-2003-0783)
  * hztty should have been setgid utmp, not setuid root, ever since the
    release of Standards-Version: 3.0.0.  My apologies for the oversight.


stable/main/binary-sparc/gtksee_0.5.0-6_sparc.deb
gtksee (0.5.0-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Viliam Holub to avoid a buffer overflow
    when <8-bit images are expanded (CAN-2003-0444)


stable/main/binary-s390/gtksee_0.5.0-6_s390.deb
gtksee (0.5.0-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Viliam Holub to avoid a buffer overflow
    when <8-bit images are expanded (CAN-2003-0444)


stable/main/binary-powerpc/gtksee_0.5.0-6_powerpc.deb
gtksee (0.5.0-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Viliam Holub to avoid a buffer overflow
    when <8-bit images are expanded (CAN-2003-0444)


stable/main/binary-mipsel/gtksee_0.5.0-6_mipsel.deb
gtksee (0.5.0-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Viliam Holub to avoid a buffer overflow
    when <8-bit images are expanded (CAN-2003-0444)


stable/main/binary-mips/gtksee_0.5.0-6_mips.deb
gtksee (0.5.0-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Viliam Holub to avoid a buffer overflow
    when <8-bit images are expanded (CAN-2003-0444)


stable/main/binary-m68k/gtksee_0.5.0-6_m68k.deb
gtksee (0.5.0-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Viliam Holub to avoid a buffer overflow
    when <8-bit images are expanded (CAN-2003-0444)


stable/main/binary-ia64/gtksee_0.5.0-6_ia64.deb
gtksee (0.5.0-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Viliam Holub to avoid a buffer overflow
    when <8-bit images are expanded (CAN-2003-0444)


stable/main/binary-hppa/gtksee_0.5.0-6_hppa.deb
gtksee (0.5.0-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Viliam Holub to avoid a buffer overflow
    when <8-bit images are expanded (CAN-2003-0444)


stable/main/binary-arm/gtksee_0.5.0-6_arm.deb
gtksee (0.5.0-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Viliam Holub to avoid a buffer overflow
    when <8-bit images are expanded (CAN-2003-0444)


stable/main/binary-alpha/gtksee_0.5.0-6_alpha.deb
gtksee (0.5.0-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Viliam Holub to avoid a buffer overflow
    when <8-bit images are expanded (CAN-2003-0444)


stable/main/source/gtksee_0.5.0-6.dsc
stable/main/source/gtksee_0.5.0-6.diff.gz
stable/main/binary-i386/gtksee_0.5.0-6_i386.deb
gtksee (0.5.0-6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Viliam Holub to avoid a buffer overflow
    when <8-bit images are expanded (CAN-2003-0444)


stable/main/binary-sparc/libgtk2.0-dbg_2.0.2-5woody2_sparc.deb
stable/main/binary-sparc/libgtk2.0-0_2.0.2-5woody2_sparc.deb
stable/main/binary-sparc/libgtk-common_2.0.2-5woody2_sparc.deb
stable/main/binary-sparc/libgtk2.0-common_2.0.2-5woody2_sparc.deb
stable/main/binary-sparc/gtk2.0-examples_2.0.2-5woody2_sparc.deb
stable/main/binary-sparc/libgtk2.0-dev_2.0.2-5woody2_sparc.deb
gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788,
    debian/patches/010.CAN-2004-0788]
  * Applied patch by Matthias Clasen to fix stack-based overflow in
    xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783,
    debian/patches/010.CAN-2004-0783]
  * Applied patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782,
    debian/patches/010.CAN-2004-0782]


stable/main/binary-s390/libgtk-common_2.0.2-5woody2_s390.deb
stable/main/binary-s390/libgtk2.0-0_2.0.2-5woody2_s390.deb
stable/main/binary-s390/gtk2.0-examples_2.0.2-5woody2_s390.deb
stable/main/binary-s390/libgtk2.0-dbg_2.0.2-5woody2_s390.deb
stable/main/binary-s390/libgtk2.0-common_2.0.2-5woody2_s390.deb
stable/main/binary-s390/libgtk2.0-dev_2.0.2-5woody2_s390.deb
gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788,
    debian/patches/010.CAN-2004-0788]
  * Applied patch by Matthias Clasen to fix stack-based overflow in
    xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783,
    debian/patches/010.CAN-2004-0783]
  * Applied patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782,
    debian/patches/010.CAN-2004-0782]


stable/main/binary-powerpc/libgtk2.0-dbg_2.0.2-5woody2_powerpc.deb
stable/main/binary-powerpc/libgtk2.0-0_2.0.2-5woody2_powerpc.deb
stable/main/binary-powerpc/gtk2.0-examples_2.0.2-5woody2_powerpc.deb
stable/main/binary-powerpc/libgtk2.0-common_2.0.2-5woody2_powerpc.deb
stable/main/binary-powerpc/libgtk-common_2.0.2-5woody2_powerpc.deb
stable/main/binary-powerpc/libgtk2.0-dev_2.0.2-5woody2_powerpc.deb
gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788,
    debian/patches/010.CAN-2004-0788]
  * Applied patch by Matthias Clasen to fix stack-based overflow in
    xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783,
    debian/patches/010.CAN-2004-0783]
  * Applied patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782,
    debian/patches/010.CAN-2004-0782]


stable/main/binary-mipsel/libgtk-common_2.0.2-5woody2_mipsel.deb
stable/main/binary-mipsel/libgtk2.0-0_2.0.2-5woody2_mipsel.deb
stable/main/binary-mipsel/libgtk2.0-common_2.0.2-5woody2_mipsel.deb
stable/main/binary-mipsel/gtk2.0-examples_2.0.2-5woody2_mipsel.deb
stable/main/binary-mipsel/libgtk2.0-dbg_2.0.2-5woody2_mipsel.deb
stable/main/binary-mipsel/libgtk2.0-dev_2.0.2-5woody2_mipsel.deb
gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788,
    debian/patches/010.CAN-2004-0788]
  * Applied patch by Matthias Clasen to fix stack-based overflow in
    xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783,
    debian/patches/010.CAN-2004-0783]
  * Applied patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782,
    debian/patches/010.CAN-2004-0782]


stable/main/binary-mips/libgtk2.0-0_2.0.2-5woody2_mips.deb
stable/main/binary-mips/libgtk2.0-common_2.0.2-5woody2_mips.deb
stable/main/binary-mips/libgtk2.0-dev_2.0.2-5woody2_mips.deb
stable/main/binary-mips/gtk2.0-examples_2.0.2-5woody2_mips.deb
stable/main/binary-mips/libgtk2.0-dbg_2.0.2-5woody2_mips.deb
stable/main/binary-mips/libgtk-common_2.0.2-5woody2_mips.deb
gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788,
    debian/patches/010.CAN-2004-0788]
  * Applied patch by Matthias Clasen to fix stack-based overflow in
    xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783,
    debian/patches/010.CAN-2004-0783]
  * Applied patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782,
    debian/patches/010.CAN-2004-0782]


stable/main/binary-m68k/libgtk2.0-0_2.0.2-5woody2_m68k.deb
stable/main/binary-m68k/libgtk2.0-dbg_2.0.2-5woody2_m68k.deb
stable/main/binary-m68k/libgtk-common_2.0.2-5woody2_m68k.deb
stable/main/binary-m68k/gtk2.0-examples_2.0.2-5woody2_m68k.deb
stable/main/binary-m68k/libgtk2.0-common_2.0.2-5woody2_m68k.deb
stable/main/binary-m68k/libgtk2.0-dev_2.0.2-5woody2_m68k.deb
gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788,
    debian/patches/010.CAN-2004-0788]
  * Applied patch by Matthias Clasen to fix stack-based overflow in
    xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783,
    debian/patches/010.CAN-2004-0783]
  * Applied patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782,
    debian/patches/010.CAN-2004-0782]


stable/main/binary-ia64/libgtk2.0-0_2.0.2-5woody2_ia64.deb
stable/main/binary-ia64/gtk2.0-examples_2.0.2-5woody2_ia64.deb
stable/main/binary-ia64/libgtk2.0-common_2.0.2-5woody2_ia64.deb
stable/main/binary-ia64/libgtk-common_2.0.2-5woody2_ia64.deb
stable/main/binary-ia64/libgtk2.0-dev_2.0.2-5woody2_ia64.deb
stable/main/binary-ia64/libgtk2.0-dbg_2.0.2-5woody2_ia64.deb
gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788,
    debian/patches/010.CAN-2004-0788]
  * Applied patch by Matthias Clasen to fix stack-based overflow in
    xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783,
    debian/patches/010.CAN-2004-0783]
  * Applied patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782,
    debian/patches/010.CAN-2004-0782]


stable/main/binary-hppa/libgtk2.0-dbg_2.0.2-5woody2_hppa.deb
stable/main/binary-hppa/gtk2.0-examples_2.0.2-5woody2_hppa.deb
stable/main/binary-hppa/libgtk2.0-common_2.0.2-5woody2_hppa.deb
stable/main/binary-hppa/libgtk2.0-0_2.0.2-5woody2_hppa.deb
stable/main/binary-hppa/libgtk2.0-dev_2.0.2-5woody2_hppa.deb
stable/main/binary-hppa/libgtk-common_2.0.2-5woody2_hppa.deb
gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788,
    debian/patches/010.CAN-2004-0788]
  * Applied patch by Matthias Clasen to fix stack-based overflow in
    xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783,
    debian/patches/010.CAN-2004-0783]
  * Applied patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782,
    debian/patches/010.CAN-2004-0782]


stable/main/binary-arm/libgtk2.0-common_2.0.2-5woody2_arm.deb
stable/main/binary-arm/libgtk2.0-dbg_2.0.2-5woody2_arm.deb
stable/main/binary-arm/libgtk2.0-dev_2.0.2-5woody2_arm.deb
stable/main/binary-arm/libgtk-common_2.0.2-5woody2_arm.deb
stable/main/binary-arm/gtk2.0-examples_2.0.2-5woody2_arm.deb
stable/main/binary-arm/libgtk2.0-0_2.0.2-5woody2_arm.deb
gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788,
    debian/patches/010.CAN-2004-0788]
  * Applied patch by Matthias Clasen to fix stack-based overflow in
    xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783,
    debian/patches/010.CAN-2004-0783]
  * Applied patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782,
    debian/patches/010.CAN-2004-0782]


stable/main/binary-alpha/libgtk2.0-dev_2.0.2-5woody2_alpha.deb
stable/main/binary-alpha/gtk2.0-examples_2.0.2-5woody2_alpha.deb
stable/main/binary-alpha/libgtk2.0-0_2.0.2-5woody2_alpha.deb
stable/main/binary-alpha/libgtk2.0-dbg_2.0.2-5woody2_alpha.deb
stable/main/binary-alpha/libgtk2.0-common_2.0.2-5woody2_alpha.deb
stable/main/binary-alpha/libgtk-common_2.0.2-5woody2_alpha.deb
gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788,
    debian/patches/010.CAN-2004-0788]
  * Applied patch by Matthias Clasen to fix stack-based overflow in
    xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783,
    debian/patches/010.CAN-2004-0783]
  * Applied patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782,
    debian/patches/010.CAN-2004-0782]


stable/main/binary-i386/libgtk2.0-common_2.0.2-5woody2_i386.deb
stable/main/binary-i386/libgtk2.0-dev_2.0.2-5woody2_i386.deb
stable/main/source/gtk+2.0_2.0.2-5woody2.dsc
stable/main/binary-all/libgtk2.0-doc_2.0.2-5woody2_all.deb
stable/main/binary-i386/gtk2.0-examples_2.0.2-5woody2_i386.deb
stable/main/binary-i386/libgtk2.0-0_2.0.2-5woody2_i386.deb
stable/main/source/gtk+2.0_2.0.2-5woody2.diff.gz
stable/main/binary-i386/libgtk-common_2.0.2-5woody2_i386.deb
stable/main/binary-i386/libgtk2.0-dbg_2.0.2-5woody2_i386.deb
gtk+2.0 (2.0.2-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788,
    debian/patches/010.CAN-2004-0788]
  * Applied patch by Matthias Clasen to fix stack-based overflow in
    xpm_extract_color [gdk-pixbuf/io-xpm.c, CAN-2004-0783,
    debian/patches/010.CAN-2004-0783]
  * Applied patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782,
    debian/patches/010.CAN-2004-0782]


stable/main/binary-sparc/gnupg_1.0.6-4woody3_sparc.deb
gnupg (1.0.6-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Recompile, no changes


stable/main/binary-s390/gnupg_1.0.6-4woody3_s390.deb
gnupg (1.0.6-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Recompile, no changes


stable/main/binary-powerpc/gnupg_1.0.6-4woody3_powerpc.deb
gnupg (1.0.6-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Recompile, no changes


stable/main/binary-mipsel/gnupg_1.0.6-4woody3_mipsel.deb
gnupg (1.0.6-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Recompile, no changes


stable/main/binary-mips/gnupg_1.0.6-4woody3_mips.deb
gnupg (1.0.6-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Recompile, no changes


stable/main/binary-m68k/gnupg_1.0.6-4woody3_m68k.deb
gnupg (1.0.6-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Recompile, no changes


stable/main/binary-ia64/gnupg_1.0.6-4woody3_ia64.deb
gnupg (1.0.6-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Recompile, no changes


stable/main/binary-hppa/gnupg_1.0.6-4woody3_hppa.deb
gnupg (1.0.6-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Recompile, no changes


stable/main/binary-arm/gnupg_1.0.6-4woody3_arm.deb
gnupg (1.0.6-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Recompile, no changes


stable/main/binary-alpha/gnupg_1.0.6-4woody3_alpha.deb
gnupg (1.0.6-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Recompile, no changes


stable/main/binary-i386/gnupg_1.0.6-4woody3_i386.deb
stable/main/source/gnupg_1.0.6-4woody3.diff.gz
stable/main/source/gnupg_1.0.6-4woody3.dsc
gnupg (1.0.6-4woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Recompile, no changes


stable/main/binary-sparc/gkrellm-newsticker_0.3-3.1_sparc.deb
gkrellm-newsticker (0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Brian Campbell to fix DoS and arbitrary command
    execution.


stable/main/binary-s390/gkrellm-newsticker_0.3-3.1_s390.deb
gkrellm-newsticker (0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Brian Campbell to fix DoS and arbitrary command
    execution.


stable/main/binary-powerpc/gkrellm-newsticker_0.3-3.1_powerpc.deb
gkrellm-newsticker (0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Brian Campbell to fix DoS and arbitrary command
    execution.


stable/main/binary-mipsel/gkrellm-newsticker_0.3-3.1_mipsel.deb
gkrellm-newsticker (0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Brian Campbell to fix DoS and arbitrary command
    execution.


stable/main/binary-mips/gkrellm-newsticker_0.3-3.1_mips.deb
gkrellm-newsticker (0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Brian Campbell to fix DoS and arbitrary command
    execution.


stable/main/binary-m68k/gkrellm-newsticker_0.3-3.1_m68k.deb
gkrellm-newsticker (0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Brian Campbell to fix DoS and arbitrary command
    execution.


stable/main/binary-ia64/gkrellm-newsticker_0.3-3.1_ia64.deb
gkrellm-newsticker (0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Brian Campbell to fix DoS and arbitrary command
    execution.


stable/main/binary-i386/gkrellm-newsticker_0.3-3.1_i386.deb
gkrellm-newsticker (0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Brian Campbell to fix DoS and arbitrary command
    execution.


stable/main/binary-hppa/gkrellm-newsticker_0.3-3.1_hppa.deb
gkrellm-newsticker (0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Brian Campbell to fix DoS and arbitrary command
    execution.


stable/main/binary-arm/gkrellm-newsticker_0.3-3.1_arm.deb
gkrellm-newsticker (0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Brian Campbell to fix DoS and arbitrary command
    execution.


stable/main/source/gkrellm-newsticker_0.3-3.1.dsc
stable/main/source/gkrellm-newsticker_0.3-3.1.diff.gz
stable/main/binary-alpha/gkrellm-newsticker_0.3-3.1_alpha.deb
gkrellm-newsticker (0.3-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Brian Campbell to fix DoS and arbitrary command
    execution.


stable/main/source/getmail_2.3.7-2.dsc
stable/main/binary-all/getmail_2.3.7-2_all.deb
stable/main/source/getmail_2.3.7-2.diff.gz
getmail (2.3.7-2) stable; urgency=high
  * Security fix for CAN-2004-0880, CAN-2004-0881 (bug:#264972)


stable/main/binary-s390/geneweb_4.06-2_s390.deb
stable/main/binary-s390/gwtp_4.06-2_s390.deb
geneweb (4.06-2) stable-security; urgency=high
  * Backported security fix from 4.09. Closes: 174779.
  * Corrected the stupid mistake in init script which
    made the log file be /var/log/.log. Closes: 169245


stable/main/binary-powerpc/geneweb_4.06-2_powerpc.deb
stable/main/binary-powerpc/gwtp_4.06-2_powerpc.deb
geneweb (4.06-2) stable-security; urgency=high
  * Backported security fix from 4.09. Closes: 174779.
  * Corrected the stupid mistake in init script which
    made the log file be /var/log/.log. Closes: 169245


stable/main/binary-mipsel/geneweb_4.06-2_mipsel.deb
stable/main/binary-mipsel/gwtp_4.06-2_mipsel.deb
geneweb (4.06-2) stable-security; urgency=high
  * Backported security fix from 4.09. Closes: 174779.
  * Corrected the stupid mistake in init script which
    made the log file be /var/log/.log. Closes: 169245


stable/main/binary-mips/geneweb_4.06-2_mips.deb
stable/main/binary-mips/gwtp_4.06-2_mips.deb
geneweb (4.06-2) stable-security; urgency=high
  * Backported security fix from 4.09. Closes: 174779.
  * Corrected the stupid mistake in init script which
    made the log file be /var/log/.log. Closes: 169245


stable/main/binary-m68k/gwtp_4.06-2_m68k.deb
stable/main/binary-m68k/geneweb_4.06-2_m68k.deb
geneweb (4.06-2) stable-security; urgency=high
  * Backported security fix from 4.09. Closes: 174779.
  * Corrected the stupid mistake in init script which
    made the log file be /var/log/.log. Closes: 169245


stable/main/binary-ia64/geneweb_4.06-2_ia64.deb
stable/main/binary-ia64/gwtp_4.06-2_ia64.deb
geneweb (4.06-2) stable-security; urgency=high
  * Backported security fix from 4.09. Closes: 174779.
  * Corrected the stupid mistake in init script which
    made the log file be /var/log/.log. Closes: 169245


stable/main/binary-i386/gwtp_4.06-2_i386.deb
stable/main/binary-i386/geneweb_4.06-2_i386.deb
geneweb (4.06-2) stable-security; urgency=high
  * Backported security fix from 4.09. Closes: 174779.
  * Corrected the stupid mistake in init script which
    made the log file be /var/log/.log. Closes: 169245


stable/main/binary-hppa/geneweb_4.06-2_hppa.deb
stable/main/binary-hppa/gwtp_4.06-2_hppa.deb
geneweb (4.06-2) stable-security; urgency=high
  * Backported security fix from 4.09. Closes: 174779.
  * Corrected the stupid mistake in init script which
    made the log file be /var/log/.log. Closes: 169245


stable/main/binary-arm/gwtp_4.06-2_arm.deb
stable/main/binary-arm/geneweb_4.06-2_arm.deb
geneweb (4.06-2) stable-security; urgency=high
  * Backported security fix from 4.09. Closes: 174779.
  * Corrected the stupid mistake in init script which
    made the log file be /var/log/.log. Closes: 169245


stable/main/binary-alpha/gwtp_4.06-2_alpha.deb
stable/main/binary-alpha/geneweb_4.06-2_alpha.deb
geneweb (4.06-2) stable-security; urgency=high
  * Backported security fix from 4.09. Closes: 174779.
  * Corrected the stupid mistake in init script which
    made the log file be /var/log/.log. Closes: 169245


stable/main/source/geneweb_4.06-2.diff.gz
stable/main/binary-sparc/geneweb_4.06-2_sparc.deb
stable/main/source/geneweb_4.06-2.dsc
stable/main/binary-sparc/gwtp_4.06-2_sparc.deb
geneweb (4.06-2) stable-security; urgency=high
  * Backported security fix from 4.09. Closes: 174779.
  * Corrected the stupid mistake in init script which
    made the log file be /var/log/.log. Closes: 169245


stable/main/binary-sparc/libgdk-pixbuf-dev_0.17.0-2woody2_sparc.deb
stable/main/binary-sparc/libgdk-pixbuf2_0.17.0-2woody2_sparc.deb
stable/main/binary-sparc/libgdk-pixbuf-gnome2_0.17.0-2woody2_sparc.deb
stable/main/binary-sparc/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_sparc.deb
gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788]
  * Backported patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782]
  * Applied patch by Manish Singh to fix denial of service in the bmp
    loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753,
    http://bugzilla.gnome.org/show_bug.cgi?id=150601]


stable/main/binary-s390/libgdk-pixbuf2_0.17.0-2woody2_s390.deb
stable/main/binary-s390/libgdk-pixbuf-dev_0.17.0-2woody2_s390.deb
stable/main/binary-s390/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_s390.deb
stable/main/binary-s390/libgdk-pixbuf-gnome2_0.17.0-2woody2_s390.deb
gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788]
  * Backported patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782]
  * Applied patch by Manish Singh to fix denial of service in the bmp
    loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753,
    http://bugzilla.gnome.org/show_bug.cgi?id=150601]


stable/main/binary-powerpc/libgdk-pixbuf-dev_0.17.0-2woody2_powerpc.deb
stable/main/binary-powerpc/libgdk-pixbuf2_0.17.0-2woody2_powerpc.deb
stable/main/binary-powerpc/libgdk-pixbuf-gnome2_0.17.0-2woody2_powerpc.deb
stable/main/binary-powerpc/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_powerpc.deb
gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788]
  * Backported patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782]
  * Applied patch by Manish Singh to fix denial of service in the bmp
    loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753,
    http://bugzilla.gnome.org/show_bug.cgi?id=150601]


stable/main/binary-mipsel/libgdk-pixbuf2_0.17.0-2woody2_mipsel.deb
stable/main/binary-mipsel/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_mipsel.deb
stable/main/binary-mipsel/libgdk-pixbuf-gnome2_0.17.0-2woody2_mipsel.deb
stable/main/binary-mipsel/libgdk-pixbuf-dev_0.17.0-2woody2_mipsel.deb
gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788]
  * Backported patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782]
  * Applied patch by Manish Singh to fix denial of service in the bmp
    loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753,
    http://bugzilla.gnome.org/show_bug.cgi?id=150601]


stable/main/binary-mips/libgdk-pixbuf-gnome2_0.17.0-2woody2_mips.deb
stable/main/binary-mips/libgdk-pixbuf2_0.17.0-2woody2_mips.deb
stable/main/binary-mips/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_mips.deb
stable/main/binary-mips/libgdk-pixbuf-dev_0.17.0-2woody2_mips.deb
gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788]
  * Backported patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782]
  * Applied patch by Manish Singh to fix denial of service in the bmp
    loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753,
    http://bugzilla.gnome.org/show_bug.cgi?id=150601]


stable/main/binary-m68k/libgdk-pixbuf-gnome2_0.17.0-2woody2_m68k.deb
stable/main/binary-m68k/libgdk-pixbuf-dev_0.17.0-2woody2_m68k.deb
stable/main/binary-m68k/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_m68k.deb
stable/main/binary-m68k/libgdk-pixbuf2_0.17.0-2woody2_m68k.deb
gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788]
  * Backported patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782]
  * Applied patch by Manish Singh to fix denial of service in the bmp
    loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753,
    http://bugzilla.gnome.org/show_bug.cgi?id=150601]


stable/main/binary-ia64/libgdk-pixbuf2_0.17.0-2woody2_ia64.deb
stable/main/binary-ia64/libgdk-pixbuf-gnome2_0.17.0-2woody2_ia64.deb
stable/main/binary-ia64/libgdk-pixbuf-dev_0.17.0-2woody2_ia64.deb
stable/main/binary-ia64/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_ia64.deb
gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788]
  * Backported patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782]
  * Applied patch by Manish Singh to fix denial of service in the bmp
    loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753,
    http://bugzilla.gnome.org/show_bug.cgi?id=150601]


stable/main/binary-hppa/libgdk-pixbuf2_0.17.0-2woody2_hppa.deb
stable/main/binary-hppa/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_hppa.deb
stable/main/binary-hppa/libgdk-pixbuf-dev_0.17.0-2woody2_hppa.deb
stable/main/binary-hppa/libgdk-pixbuf-gnome2_0.17.0-2woody2_hppa.deb
gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788]
  * Backported patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782]
  * Applied patch by Manish Singh to fix denial of service in the bmp
    loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753,
    http://bugzilla.gnome.org/show_bug.cgi?id=150601]


stable/main/binary-arm/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_arm.deb
stable/main/binary-arm/libgdk-pixbuf2_0.17.0-2woody2_arm.deb
stable/main/binary-arm/libgdk-pixbuf-dev_0.17.0-2woody2_arm.deb
stable/main/binary-arm/libgdk-pixbuf-gnome2_0.17.0-2woody2_arm.deb
gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788]
  * Backported patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782]
  * Applied patch by Manish Singh to fix denial of service in the bmp
    loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753,
    http://bugzilla.gnome.org/show_bug.cgi?id=150601]


stable/main/binary-alpha/libgdk-pixbuf-gnome2_0.17.0-2woody2_alpha.deb
stable/main/binary-alpha/libgdk-pixbuf2_0.17.0-2woody2_alpha.deb
stable/main/binary-alpha/libgdk-pixbuf-dev_0.17.0-2woody2_alpha.deb
stable/main/binary-alpha/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_alpha.deb
gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788]
  * Backported patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782]
  * Applied patch by Manish Singh to fix denial of service in the bmp
    loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753,
    http://bugzilla.gnome.org/show_bug.cgi?id=150601]


stable/main/binary-i386/libgdk-pixbuf2_0.17.0-2woody2_i386.deb
stable/main/binary-i386/libgdk-pixbuf-gnome2_0.17.0-2woody2_i386.deb
stable/main/source/gdk-pixbuf_0.17.0-2woody2.dsc
stable/main/binary-i386/libgdk-pixbuf-dev_0.17.0-2woody2_i386.deb
stable/main/binary-i386/libgdk-pixbuf-gnome-dev_0.17.0-2woody2_i386.deb
stable/main/source/gdk-pixbuf_0.17.0-2woody2.diff.gz
gdk-pixbuf (0.17.0-2woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Matthias Clasen to fix integer overflow in the ico
    loader [gdk-pixbuf/io-ico.c, CAN-2004-0788]
  * Backported patch by Matthias Clasen to fix heap-based overflow in
    pixbuf_create_from_xpm [gdk-pixbuf/io-xpm.c, CAN-2004-0782]
  * Applied patch by Manish Singh to fix denial of service in the bmp
    loader [gdk-pixbuf/io-bmp.c, CAN-2004-0753,
    http://bugzilla.gnome.org/show_bug.cgi?id=150601]


stable/main/source/gatos_0.0.5-6woody1.diff.gz
stable/main/binary-i386/gatos_0.0.5-6woody1_i386.deb
stable/main/binary-i386/libgatos0_0.0.5-6woody1_i386.deb
stable/main/source/gatos_0.0.5-6woody1.dsc
stable/main/binary-i386/libgatos-dev_0.0.5-6woody1_i386.deb
gatos (0.0.5-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Don't attempt to use system() to run the configuration program; just print
    a message instead.  This eliminates a vulnerability where system() trusts
    the PATH environment variable (CAN-2004-0395)


stable/main/source/gallery_1.2.5-8woody2.dsc
stable/main/binary-all/gallery_1.2.5-8woody2_all.deb
stable/main/source/gallery_1.2.5-8woody2.diff.gz
gallery (1.2.5-8woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Add GALLERY_EMBEDDED_INSIDE{,_TYPE} to $sensitiveList in init.php, to
    prevent a vulnerability allowing access to the gallery admin user without
    proper authentication (no CVE candidate available at time of release)


stable/main/binary-s390/gaim-gnome_0.58-2.4_s390.deb
stable/main/binary-s390/gaim-common_0.58-2.4_s390.deb
stable/main/binary-s390/gaim_0.58-2.4_s390.deb
gaim (1:0.58-2.4) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser
    overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect
    overflow [src/proxy.c], CAN-2004-0006
  * Applied a patch to fix an AIM/Oscar DirectIM integer overflow
    [src/protocols/oscar/ft.c], CAN-2004-0008


stable/main/binary-powerpc/gaim-gnome_0.58-2.4_powerpc.deb
stable/main/binary-powerpc/gaim_0.58-2.4_powerpc.deb
stable/main/binary-powerpc/gaim-common_0.58-2.4_powerpc.deb
gaim (1:0.58-2.4) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser
    overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect
    overflow [src/proxy.c], CAN-2004-0006
  * Applied a patch to fix an AIM/Oscar DirectIM integer overflow
    [src/protocols/oscar/ft.c], CAN-2004-0008


stable/main/binary-mipsel/gaim_0.58-2.4_mipsel.deb
stable/main/binary-mipsel/gaim-gnome_0.58-2.4_mipsel.deb
stable/main/binary-mipsel/gaim-common_0.58-2.4_mipsel.deb
gaim (1:0.58-2.4) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser
    overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect
    overflow [src/proxy.c], CAN-2004-0006
  * Applied a patch to fix an AIM/Oscar DirectIM integer overflow
    [src/protocols/oscar/ft.c], CAN-2004-0008


stable/main/binary-mips/gaim-gnome_0.58-2.4_mips.deb
stable/main/binary-mips/gaim_0.58-2.4_mips.deb
stable/main/binary-mips/gaim-common_0.58-2.4_mips.deb
gaim (1:0.58-2.4) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser
    overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect
    overflow [src/proxy.c], CAN-2004-0006
  * Applied a patch to fix an AIM/Oscar DirectIM integer overflow
    [src/protocols/oscar/ft.c], CAN-2004-0008


stable/main/binary-m68k/gaim_0.58-2.4_m68k.deb
stable/main/binary-m68k/gaim-gnome_0.58-2.4_m68k.deb
stable/main/binary-m68k/gaim-common_0.58-2.4_m68k.deb
gaim (1:0.58-2.4) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser
    overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect
    overflow [src/proxy.c], CAN-2004-0006
  * Applied a patch to fix an AIM/Oscar DirectIM integer overflow
    [src/protocols/oscar/ft.c], CAN-2004-0008


stable/main/binary-ia64/gaim_0.58-2.4_ia64.deb
stable/main/binary-ia64/gaim-gnome_0.58-2.4_ia64.deb
stable/main/binary-ia64/gaim-common_0.58-2.4_ia64.deb
gaim (1:0.58-2.4) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser
    overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect
    overflow [src/proxy.c], CAN-2004-0006
  * Applied a patch to fix an AIM/Oscar DirectIM integer overflow
    [src/protocols/oscar/ft.c], CAN-2004-0008


stable/main/binary-i386/gaim-common_0.58-2.4_i386.deb
stable/main/binary-i386/gaim_0.58-2.4_i386.deb
stable/main/binary-i386/gaim-gnome_0.58-2.4_i386.deb
gaim (1:0.58-2.4) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser
    overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect
    overflow [src/proxy.c], CAN-2004-0006
  * Applied a patch to fix an AIM/Oscar DirectIM integer overflow
    [src/protocols/oscar/ft.c], CAN-2004-0008


stable/main/binary-hppa/gaim-gnome_0.58-2.4_hppa.deb
stable/main/binary-hppa/gaim_0.58-2.4_hppa.deb
stable/main/binary-hppa/gaim-common_0.58-2.4_hppa.deb
gaim (1:0.58-2.4) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser
    overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect
    overflow [src/proxy.c], CAN-2004-0006
  * Applied a patch to fix an AIM/Oscar DirectIM integer overflow
    [src/protocols/oscar/ft.c], CAN-2004-0008


stable/main/binary-arm/gaim-common_0.58-2.4_arm.deb
stable/main/binary-arm/gaim_0.58-2.4_arm.deb
stable/main/binary-arm/gaim-gnome_0.58-2.4_arm.deb
gaim (1:0.58-2.4) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser
    overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect
    overflow [src/proxy.c], CAN-2004-0006
  * Applied a patch to fix an AIM/Oscar DirectIM integer overflow
    [src/protocols/oscar/ft.c], CAN-2004-0008


stable/main/binary-alpha/gaim_0.58-2.4_alpha.deb
stable/main/binary-alpha/gaim-gnome_0.58-2.4_alpha.deb
stable/main/binary-alpha/gaim-common_0.58-2.4_alpha.deb
gaim (1:0.58-2.4) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser
    overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect
    overflow [src/proxy.c], CAN-2004-0006
  * Applied a patch to fix an AIM/Oscar DirectIM integer overflow
    [src/protocols/oscar/ft.c], CAN-2004-0008


stable/main/binary-sparc/gaim-common_0.58-2.4_sparc.deb
stable/main/source/gaim_0.58-2.4.dsc
stable/main/source/gaim_0.58-2.4.diff.gz
stable/main/binary-sparc/gaim_0.58-2.4_sparc.deb
stable/main/binary-sparc/gaim-gnome_0.58-2.4_sparc.deb
gaim (1:0.58-2.4) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied patch by Jacques A. Vidrine to fix a Yahoo packet parser
    overflow [src/protocols/yahoo/yahoo.c] and an HTTP proxy connect
    overflow [src/proxy.c], CAN-2004-0006
  * Applied a patch to fix an AIM/Oscar DirectIM integer overflow
    [src/protocols/oscar/ft.c], CAN-2004-0008


stable/main/binary-sparc/fspd_2.81.b3-3.1woody1_sparc.deb
stable/main/binary-sparc/fsp_2.81.b3-3.1woody1_sparc.deb
fsp (2.81.b3-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix directory traversal bug in validate_path() (CAN-2003-1022)
    [server/file.c]


stable/main/binary-s390/fsp_2.81.b3-3.1woody1_s390.deb
stable/main/binary-s390/fspd_2.81.b3-3.1woody1_s390.deb
fsp (2.81.b3-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix directory traversal bug in validate_path() (CAN-2003-1022)
    [server/file.c]


stable/main/binary-powerpc/fsp_2.81.b3-3.1woody1_powerpc.deb
stable/main/binary-powerpc/fspd_2.81.b3-3.1woody1_powerpc.deb
fsp (2.81.b3-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix directory traversal bug in validate_path() (CAN-2003-1022)
    [server/file.c]


stable/main/binary-mipsel/fsp_2.81.b3-3.1woody1_mipsel.deb
stable/main/binary-mipsel/fspd_2.81.b3-3.1woody1_mipsel.deb
fsp (2.81.b3-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix directory traversal bug in validate_path() (CAN-2003-1022)
    [server/file.c]


stable/main/binary-mips/fsp_2.81.b3-3.1woody1_mips.deb
stable/main/binary-mips/fspd_2.81.b3-3.1woody1_mips.deb
fsp (2.81.b3-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix directory traversal bug in validate_path() (CAN-2003-1022)
    [server/file.c]


stable/main/binary-m68k/fspd_2.81.b3-3.1woody1_m68k.deb
stable/main/binary-m68k/fsp_2.81.b3-3.1woody1_m68k.deb
fsp (2.81.b3-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix directory traversal bug in validate_path() (CAN-2003-1022)
    [server/file.c]


stable/main/binary-ia64/fsp_2.81.b3-3.1woody1_ia64.deb
stable/main/binary-ia64/fspd_2.81.b3-3.1woody1_ia64.deb
fsp (2.81.b3-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix directory traversal bug in validate_path() (CAN-2003-1022)
    [server/file.c]


stable/main/binary-hppa/fsp_2.81.b3-3.1woody1_hppa.deb
stable/main/binary-hppa/fspd_2.81.b3-3.1woody1_hppa.deb
fsp (2.81.b3-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix directory traversal bug in validate_path() (CAN-2003-1022)
    [server/file.c]


stable/main/binary-arm/fsp_2.81.b3-3.1woody1_arm.deb
stable/main/binary-arm/fspd_2.81.b3-3.1woody1_arm.deb
fsp (2.81.b3-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix directory traversal bug in validate_path() (CAN-2003-1022)
    [server/file.c]


stable/main/binary-alpha/fsp_2.81.b3-3.1woody1_alpha.deb
stable/main/binary-alpha/fspd_2.81.b3-3.1woody1_alpha.deb
fsp (2.81.b3-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix directory traversal bug in validate_path() (CAN-2003-1022)
    [server/file.c]


stable/main/source/fsp_2.81.b3-3.1woody1.diff.gz
stable/main/binary-i386/fspd_2.81.b3-3.1woody1_i386.deb
stable/main/source/fsp_2.81.b3-3.1woody1.dsc
stable/main/binary-i386/fsp_2.81.b3-3.1woody1_i386.deb
fsp (2.81.b3-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix directory traversal bug in validate_path() (CAN-2003-1022)
    [server/file.c]


stable/main/binary-sparc/freenet6_0.9.6-1woody3_sparc.deb
freenet6 (0.9.6-1woody3) stable-security; urgency=medium
  * Non-mainatiner upload by the Security Team
  * Added a dependency to stat which is not yet an essential package (as
    in sid).


stable/main/binary-s390/freenet6_0.9.6-1woody3_s390.deb
freenet6 (0.9.6-1woody3) stable-security; urgency=medium
  * Non-mainatiner upload by the Security Team
  * Added a dependency to stat which is not yet an essential package (as
    in sid).


stable/main/binary-powerpc/freenet6_0.9.6-1woody3_powerpc.deb
freenet6 (0.9.6-1woody3) stable-security; urgency=medium
  * Non-mainatiner upload by the Security Team
  * Added a dependency to stat which is not yet an essential package (as
    in sid).


stable/main/binary-mipsel/freenet6_0.9.6-1woody3_mipsel.deb
freenet6 (0.9.6-1woody3) stable-security; urgency=medium
  * Non-mainatiner upload by the Security Team
  * Added a dependency to stat which is not yet an essential package (as
    in sid).


stable/main/binary-mips/freenet6_0.9.6-1woody3_mips.deb
freenet6 (0.9.6-1woody3) stable-security; urgency=medium
  * Non-mainatiner upload by the Security Team
  * Added a dependency to stat which is not yet an essential package (as
    in sid).


stable/main/binary-m68k/freenet6_0.9.6-1woody3_m68k.deb
freenet6 (0.9.6-1woody3) stable-security; urgency=medium
  * Non-mainatiner upload by the Security Team
  * Added a dependency to stat which is not yet an essential package (as
    in sid).


stable/main/binary-ia64/freenet6_0.9.6-1woody3_ia64.deb
freenet6 (0.9.6-1woody3) stable-security; urgency=medium
  * Non-mainatiner upload by the Security Team
  * Added a dependency to stat which is not yet an essential package (as
    in sid).


stable/main/binary-hppa/freenet6_0.9.6-1woody3_hppa.deb
freenet6 (0.9.6-1woody3) stable-security; urgency=medium
  * Non-mainatiner upload by the Security Team
  * Added a dependency to stat which is not yet an essential package (as
    in sid).


stable/main/binary-arm/freenet6_0.9.6-1woody3_arm.deb
freenet6 (0.9.6-1woody3) stable-security; urgency=medium
  * Non-mainatiner upload by the Security Team
  * Added a dependency to stat which is not yet an essential package (as
    in sid).


stable/main/binary-alpha/freenet6_0.9.6-1woody3_alpha.deb
freenet6 (0.9.6-1woody3) stable-security; urgency=medium
  * Non-mainatiner upload by the Security Team
  * Added a dependency to stat which is not yet an essential package (as
    in sid).


stable/main/source/freenet6_0.9.6-1woody3.dsc
stable/main/source/freenet6_0.9.6-1woody3.diff.gz
stable/main/binary-i386/freenet6_0.9.6-1woody3_i386.deb
freenet6 (0.9.6-1woody3) stable-security; urgency=medium
  * Non-mainatiner upload by the Security Team
  * Added a dependency to stat which is not yet an essential package (as
    in sid).


stable/main/binary-all/flim_1.14.3-9woody1_all.deb
stable/main/source/flim_1.14.3-9woody1.diff.gz
stable/main/source/flim_1.14.3-9woody1.dsc
flim (1:1.14.3-9woody1) stable-security; urgency=high
  * mel-u.el (mime-write-decoded-region): Use mel-u-make-temp-file.
    (uuencode-external-decode-region): Ditto.
    (backport from upstream CVS version on 2004-04-15)
  * Fixes insecure temporary file vulnerabilities (CAN-2004-0422)


stable/main/binary-sparc/eximon_3.35-1woody3_sparc.deb
stable/main/binary-sparc/exim_3.35-1woody3_sparc.deb
exim (3.35-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Georgi Guninski <guninski@guninski.com> to fix a
    stack-based buffer overflow when "sender_verify = true" [src/verify.c,
    CAN-2004-0399]
  * Added bounds checking when copying header content to fix a buffer
    overflow when headers_check_syntax is enabled, discovered by Georgi
    Guninski [src/accept.c, CAN-2004-0400]


stable/main/binary-s390/exim_3.35-1woody3_s390.deb
stable/main/binary-s390/eximon_3.35-1woody3_s390.deb
exim (3.35-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Georgi Guninski <guninski@guninski.com> to fix a
    stack-based buffer overflow when "sender_verify = true" [src/verify.c,
    CAN-2004-0399]
  * Added bounds checking when copying header content to fix a buffer
    overflow when headers_check_syntax is enabled, discovered by Georgi
    Guninski [src/accept.c, CAN-2004-0400]


stable/main/binary-powerpc/eximon_3.35-1woody3_powerpc.deb
stable/main/binary-powerpc/exim_3.35-1woody3_powerpc.deb
exim (3.35-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Georgi Guninski <guninski@guninski.com> to fix a
    stack-based buffer overflow when "sender_verify = true" [src/verify.c,
    CAN-2004-0399]
  * Added bounds checking when copying header content to fix a buffer
    overflow when headers_check_syntax is enabled, discovered by Georgi
    Guninski [src/accept.c, CAN-2004-0400]


stable/main/binary-mipsel/eximon_3.35-1woody3_mipsel.deb
stable/main/binary-mipsel/exim_3.35-1woody3_mipsel.deb
exim (3.35-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Georgi Guninski <guninski@guninski.com> to fix a
    stack-based buffer overflow when "sender_verify = true" [src/verify.c,
    CAN-2004-0399]
  * Added bounds checking when copying header content to fix a buffer
    overflow when headers_check_syntax is enabled, discovered by Georgi
    Guninski [src/accept.c, CAN-2004-0400]


stable/main/binary-mips/exim_3.35-1woody3_mips.deb
stable/main/binary-mips/eximon_3.35-1woody3_mips.deb
exim (3.35-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Georgi Guninski <guninski@guninski.com> to fix a
    stack-based buffer overflow when "sender_verify = true" [src/verify.c,
    CAN-2004-0399]
  * Added bounds checking when copying header content to fix a buffer
    overflow when headers_check_syntax is enabled, discovered by Georgi
    Guninski [src/accept.c, CAN-2004-0400]


stable/main/binary-m68k/eximon_3.35-1woody3_m68k.deb
stable/main/binary-m68k/exim_3.35-1woody3_m68k.deb
exim (3.35-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Georgi Guninski <guninski@guninski.com> to fix a
    stack-based buffer overflow when "sender_verify = true" [src/verify.c,
    CAN-2004-0399]
  * Added bounds checking when copying header content to fix a buffer
    overflow when headers_check_syntax is enabled, discovered by Georgi
    Guninski [src/accept.c, CAN-2004-0400]


stable/main/binary-ia64/eximon_3.35-1woody3_ia64.deb
stable/main/binary-ia64/exim_3.35-1woody3_ia64.deb
exim (3.35-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Georgi Guninski <guninski@guninski.com> to fix a
    stack-based buffer overflow when "sender_verify = true" [src/verify.c,
    CAN-2004-0399]
  * Added bounds checking when copying header content to fix a buffer
    overflow when headers_check_syntax is enabled, discovered by Georgi
    Guninski [src/accept.c, CAN-2004-0400]


stable/main/binary-hppa/exim_3.35-1woody3_hppa.deb
stable/main/binary-hppa/eximon_3.35-1woody3_hppa.deb
exim (3.35-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Georgi Guninski <guninski@guninski.com> to fix a
    stack-based buffer overflow when "sender_verify = true" [src/verify.c,
    CAN-2004-0399]
  * Added bounds checking when copying header content to fix a buffer
    overflow when headers_check_syntax is enabled, discovered by Georgi
    Guninski [src/accept.c, CAN-2004-0400]


stable/main/binary-arm/exim_3.35-1woody3_arm.deb
stable/main/binary-arm/eximon_3.35-1woody3_arm.deb
exim (3.35-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Georgi Guninski <guninski@guninski.com> to fix a
    stack-based buffer overflow when "sender_verify = true" [src/verify.c,
    CAN-2004-0399]
  * Added bounds checking when copying header content to fix a buffer
    overflow when headers_check_syntax is enabled, discovered by Georgi
    Guninski [src/accept.c, CAN-2004-0400]


stable/main/binary-alpha/exim_3.35-1woody3_alpha.deb
stable/main/binary-alpha/eximon_3.35-1woody3_alpha.deb
exim (3.35-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Georgi Guninski <guninski@guninski.com> to fix a
    stack-based buffer overflow when "sender_verify = true" [src/verify.c,
    CAN-2004-0399]
  * Added bounds checking when copying header content to fix a buffer
    overflow when headers_check_syntax is enabled, discovered by Georgi
    Guninski [src/accept.c, CAN-2004-0400]


stable/main/source/exim_3.35-1woody3.dsc
stable/main/binary-i386/exim_3.35-1woody3_i386.deb
stable/main/binary-i386/eximon_3.35-1woody3_i386.deb
stable/main/source/exim_3.35-1woody3.diff.gz
exim (3.35-1woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Georgi Guninski <guninski@guninski.com> to fix a
    stack-based buffer overflow when "sender_verify = true" [src/verify.c,
    CAN-2004-0399]
  * Added bounds checking when copying header content to fix a buffer
    overflow when headers_check_syntax is enabled, discovered by Georgi
    Guninski [src/accept.c, CAN-2004-0400]


stable/main/binary-sparc/ethereal-dev_0.9.4-1woody8_sparc.deb
stable/main/binary-sparc/ethereal_0.9.4-1woody8_sparc.deb
stable/main/binary-sparc/ethereal-common_0.9.4-1woody8_sparc.deb
stable/main/binary-sparc/tethereal_0.9.4-1woody8_sparc.deb
ethereal (0.9.4-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector
    (CAN-2004-0635)


stable/main/binary-s390/ethereal-common_0.9.4-1woody8_s390.deb
stable/main/binary-s390/ethereal_0.9.4-1woody8_s390.deb
stable/main/binary-s390/tethereal_0.9.4-1woody8_s390.deb
stable/main/binary-s390/ethereal-dev_0.9.4-1woody8_s390.deb
ethereal (0.9.4-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector
    (CAN-2004-0635)


stable/main/binary-powerpc/ethereal-dev_0.9.4-1woody8_powerpc.deb
stable/main/binary-powerpc/ethereal_0.9.4-1woody8_powerpc.deb
stable/main/binary-powerpc/ethereal-common_0.9.4-1woody8_powerpc.deb
stable/main/binary-powerpc/tethereal_0.9.4-1woody8_powerpc.deb
ethereal (0.9.4-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector
    (CAN-2004-0635)


stable/main/binary-mipsel/ethereal-common_0.9.4-1woody8_mipsel.deb
stable/main/binary-mipsel/ethereal_0.9.4-1woody8_mipsel.deb
stable/main/binary-mipsel/ethereal-dev_0.9.4-1woody8_mipsel.deb
stable/main/binary-mipsel/tethereal_0.9.4-1woody8_mipsel.deb
ethereal (0.9.4-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector
    (CAN-2004-0635)


stable/main/binary-mips/ethereal_0.9.4-1woody8_mips.deb
stable/main/binary-mips/ethereal-common_0.9.4-1woody8_mips.deb
stable/main/binary-mips/tethereal_0.9.4-1woody8_mips.deb
stable/main/binary-mips/ethereal-dev_0.9.4-1woody8_mips.deb
ethereal (0.9.4-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector
    (CAN-2004-0635)


stable/main/binary-m68k/ethereal-common_0.9.4-1woody8_m68k.deb
stable/main/binary-m68k/ethereal_0.9.4-1woody8_m68k.deb
stable/main/binary-m68k/ethereal-dev_0.9.4-1woody8_m68k.deb
stable/main/binary-m68k/tethereal_0.9.4-1woody8_m68k.deb
ethereal (0.9.4-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector
    (CAN-2004-0635)


stable/main/binary-ia64/ethereal-dev_0.9.4-1woody8_ia64.deb
stable/main/binary-ia64/ethereal-common_0.9.4-1woody8_ia64.deb
stable/main/binary-ia64/ethereal_0.9.4-1woody8_ia64.deb
stable/main/binary-ia64/tethereal_0.9.4-1woody8_ia64.deb
ethereal (0.9.4-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector
    (CAN-2004-0635)


stable/main/binary-hppa/ethereal-common_0.9.4-1woody8_hppa.deb
stable/main/binary-hppa/ethereal_0.9.4-1woody8_hppa.deb
stable/main/binary-hppa/tethereal_0.9.4-1woody8_hppa.deb
stable/main/binary-hppa/ethereal-dev_0.9.4-1woody8_hppa.deb
ethereal (0.9.4-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector
    (CAN-2004-0635)


stable/main/binary-arm/ethereal-common_0.9.4-1woody8_arm.deb
stable/main/binary-arm/tethereal_0.9.4-1woody8_arm.deb
stable/main/binary-arm/ethereal_0.9.4-1woody8_arm.deb
stable/main/binary-arm/ethereal-dev_0.9.4-1woody8_arm.deb
ethereal (0.9.4-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector
    (CAN-2004-0635)


stable/main/binary-alpha/ethereal-common_0.9.4-1woody8_alpha.deb
stable/main/binary-alpha/ethereal_0.9.4-1woody8_alpha.deb
stable/main/binary-alpha/ethereal-dev_0.9.4-1woody8_alpha.deb
stable/main/binary-alpha/tethereal_0.9.4-1woody8_alpha.deb
ethereal (0.9.4-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector
    (CAN-2004-0635)


stable/main/binary-i386/ethereal-dev_0.9.4-1woody8_i386.deb
stable/main/source/ethereal_0.9.4-1woody8.diff.gz
stable/main/source/ethereal_0.9.4-1woody8.dsc
stable/main/binary-i386/tethereal_0.9.4-1woody8_i386.deb
stable/main/binary-i386/ethereal-common_0.9.4-1woody8_i386.deb
stable/main/binary-i386/ethereal_0.9.4-1woody8_i386.deb
ethereal (0.9.4-1woody8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from upstream CVS to fix DoS vulnerability in SNMP dissector
    (CAN-2004-0635)


stable/main/binary-sparc/eterm_0.9.2-0pre2002042903.3_sparc.deb
eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068]


stable/main/binary-s390/eterm_0.9.2-0pre2002042903.3_s390.deb
eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068]


stable/main/binary-powerpc/eterm_0.9.2-0pre2002042903.3_powerpc.deb
eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068]


stable/main/binary-mipsel/eterm_0.9.2-0pre2002042903.3_mipsel.deb
eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068]


stable/main/binary-mips/eterm_0.9.2-0pre2002042903.3_mips.deb
eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068]


stable/main/binary-m68k/eterm_0.9.2-0pre2002042903.3_m68k.deb
eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068]


stable/main/binary-ia64/eterm_0.9.2-0pre2002042903.3_ia64.deb
eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068]


stable/main/binary-hppa/eterm_0.9.2-0pre2002042903.3_hppa.deb
eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068]


stable/main/binary-arm/eterm_0.9.2-0pre2002042903.3_arm.deb
eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068]


stable/main/binary-alpha/eterm_0.9.2-0pre2002042903.3_alpha.deb
eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068]


stable/main/binary-i386/eterm_0.9.2-0pre2002042903.3_i386.deb
stable/main/source/eterm_0.9.2-0pre2002042903.3.dsc
stable/main/source/eterm_0.9.2-0pre2002042903.3.tar.gz
eterm (0.9.2-0pre2002042903.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled emitting ESC sequences [src/term.c, CAN-2003-0068]


stable/main/binary-sparc/emil_2.1.0-beta9-11woody1_sparc.deb
emil (2.1.0-beta9-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Ulf Harnhammar to fix:
    - buffer overflows (CAN-2004-0152)
    - format string bugs (CAN-2004-0153)
  * Backport fix for #146106 from unstable to fix compilation with bison in
    1.31 in woody


stable/main/binary-s390/emil_2.1.0-beta9-11woody1_s390.deb
emil (2.1.0-beta9-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Ulf Harnhammar to fix:
    - buffer overflows (CAN-2004-0152)
    - format string bugs (CAN-2004-0153)
  * Backport fix for #146106 from unstable to fix compilation with bison in
    1.31 in woody


stable/main/binary-powerpc/emil_2.1.0-beta9-11woody1_powerpc.deb
emil (2.1.0-beta9-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Ulf Harnhammar to fix:
    - buffer overflows (CAN-2004-0152)
    - format string bugs (CAN-2004-0153)
  * Backport fix for #146106 from unstable to fix compilation with bison in
    1.31 in woody


stable/main/binary-mipsel/emil_2.1.0-beta9-11woody1_mipsel.deb
emil (2.1.0-beta9-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Ulf Harnhammar to fix:
    - buffer overflows (CAN-2004-0152)
    - format string bugs (CAN-2004-0153)
  * Backport fix for #146106 from unstable to fix compilation with bison in
    1.31 in woody


stable/main/binary-mips/emil_2.1.0-beta9-11woody1_mips.deb
emil (2.1.0-beta9-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Ulf Harnhammar to fix:
    - buffer overflows (CAN-2004-0152)
    - format string bugs (CAN-2004-0153)
  * Backport fix for #146106 from unstable to fix compilation with bison in
    1.31 in woody


stable/main/binary-m68k/emil_2.1.0-beta9-11woody1_m68k.deb
emil (2.1.0-beta9-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Ulf Harnhammar to fix:
    - buffer overflows (CAN-2004-0152)
    - format string bugs (CAN-2004-0153)
  * Backport fix for #146106 from unstable to fix compilation with bison in
    1.31 in woody


stable/main/binary-ia64/emil_2.1.0-beta9-11woody1_ia64.deb
emil (2.1.0-beta9-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Ulf Harnhammar to fix:
    - buffer overflows (CAN-2004-0152)
    - format string bugs (CAN-2004-0153)
  * Backport fix for #146106 from unstable to fix compilation with bison in
    1.31 in woody


stable/main/binary-hppa/emil_2.1.0-beta9-11woody1_hppa.deb
emil (2.1.0-beta9-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Ulf Harnhammar to fix:
    - buffer overflows (CAN-2004-0152)
    - format string bugs (CAN-2004-0153)
  * Backport fix for #146106 from unstable to fix compilation with bison in
    1.31 in woody


stable/main/binary-arm/emil_2.1.0-beta9-11woody1_arm.deb
emil (2.1.0-beta9-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Ulf Harnhammar to fix:
    - buffer overflows (CAN-2004-0152)
    - format string bugs (CAN-2004-0153)
  * Backport fix for #146106 from unstable to fix compilation with bison in
    1.31 in woody


stable/main/binary-alpha/emil_2.1.0-beta9-11woody1_alpha.deb
emil (2.1.0-beta9-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Ulf Harnhammar to fix:
    - buffer overflows (CAN-2004-0152)
    - format string bugs (CAN-2004-0153)
  * Backport fix for #146106 from unstable to fix compilation with bison in
    1.31 in woody


stable/main/source/emil_2.1.0-beta9-11woody1.dsc
stable/main/source/emil_2.1.0-beta9-11woody1.diff.gz
stable/main/binary-i386/emil_2.1.0-beta9-11woody1_i386.deb
emil (2.1.0-beta9-11woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Ulf Harnhammar to fix:
    - buffer overflows (CAN-2004-0152)
    - format string bugs (CAN-2004-0153)
  * Backport fix for #146106 from unstable to fix compilation with bison in
    1.31 in woody


stable/main/binary-sparc/ecartis_0.129a+1.0.0-snap20020514-1.3_sparc.deb
stable/main/binary-sparc/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_sparc.deb
ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Blars Blarson to fix unauthorised access to the admin
    CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913]


stable/main/binary-s390/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_s390.deb
stable/main/binary-s390/ecartis_0.129a+1.0.0-snap20020514-1.3_s390.deb
ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Blars Blarson to fix unauthorised access to the admin
    CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913]


stable/main/binary-powerpc/ecartis_0.129a+1.0.0-snap20020514-1.3_powerpc.deb
stable/main/binary-powerpc/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_powerpc.deb
ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Blars Blarson to fix unauthorised access to the admin
    CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913]


stable/main/binary-mipsel/ecartis_0.129a+1.0.0-snap20020514-1.3_mipsel.deb
stable/main/binary-mipsel/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_mipsel.deb
ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Blars Blarson to fix unauthorised access to the admin
    CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913]


stable/main/binary-mips/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_mips.deb
stable/main/binary-mips/ecartis_0.129a+1.0.0-snap20020514-1.3_mips.deb
ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Blars Blarson to fix unauthorised access to the admin
    CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913]


stable/main/binary-m68k/ecartis_0.129a+1.0.0-snap20020514-1.3_m68k.deb
stable/main/binary-m68k/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_m68k.deb
ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Blars Blarson to fix unauthorised access to the admin
    CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913]


stable/main/binary-ia64/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_ia64.deb
stable/main/binary-ia64/ecartis_0.129a+1.0.0-snap20020514-1.3_ia64.deb
ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Blars Blarson to fix unauthorised access to the admin
    CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913]


stable/main/binary-hppa/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_hppa.deb
stable/main/binary-hppa/ecartis_0.129a+1.0.0-snap20020514-1.3_hppa.deb
ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Blars Blarson to fix unauthorised access to the admin
    CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913]


stable/main/binary-arm/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_arm.deb
stable/main/binary-arm/ecartis_0.129a+1.0.0-snap20020514-1.3_arm.deb
ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Blars Blarson to fix unauthorised access to the admin
    CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913]


stable/main/binary-alpha/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_alpha.deb
stable/main/binary-alpha/ecartis_0.129a+1.0.0-snap20020514-1.3_alpha.deb
ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Blars Blarson to fix unauthorised access to the admin
    CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913]


stable/main/binary-i386/ecartis_0.129a+1.0.0-snap20020514-1.3_i386.deb
stable/main/source/ecartis_0.129a+1.0.0-snap20020514-1.3.dsc
stable/main/source/ecartis_0.129a+1.0.0-snap20020514-1.3.diff.gz
stable/main/binary-i386/ecartis-cgi_0.129a+1.0.0-snap20020514-1.3_i386.deb
ecartis (0.129a+1.0.0-snap20020514-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Blars Blarson to fix unauthorised access to the admin
    CGI [src/modules/lsg2/lsg2-main.c, CAN-2004-0913]


stable/main/binary-sparc/debootstrap_0.1.17.7woody1_sparc.deb
stable/main/binary-sparc/debootstrap-udeb_0.1.17.7woody1_sparc.udeb
debootstrap (0.1.17.7woody1) stable; urgency=medium
  * NMU
  * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing
    package dependency fixes, among others.
  * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is
    newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8
    are still straightforward.


stable/main/binary-s390/debootstrap-udeb_0.1.17.7woody1_s390.udeb
stable/main/binary-s390/debootstrap_0.1.17.7woody1_s390.deb
debootstrap (0.1.17.7woody1) stable; urgency=medium
  * NMU
  * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing
    package dependency fixes, among others.
  * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is
    newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8
    are still straightforward.


stable/main/binary-powerpc/debootstrap-udeb_0.1.17.7woody1_powerpc.udeb
stable/main/binary-powerpc/debootstrap_0.1.17.7woody1_powerpc.deb
debootstrap (0.1.17.7woody1) stable; urgency=medium
  * NMU
  * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing
    package dependency fixes, among others.
  * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is
    newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8
    are still straightforward.


stable/main/binary-mipsel/debootstrap_0.1.17.7woody1_mipsel.deb
stable/main/binary-mipsel/debootstrap-udeb_0.1.17.7woody1_mipsel.udeb
debootstrap (0.1.17.7woody1) stable; urgency=medium
  * NMU
  * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing
    package dependency fixes, among others.
  * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is
    newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8
    are still straightforward.


stable/main/binary-mips/debootstrap-udeb_0.1.17.7woody1_mips.udeb
stable/main/binary-mips/debootstrap_0.1.17.7woody1_mips.deb
debootstrap (0.1.17.7woody1) stable; urgency=medium
  * NMU
  * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing
    package dependency fixes, among others.
  * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is
    newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8
    are still straightforward.


stable/main/binary-m68k/debootstrap-udeb_0.1.17.7woody1_m68k.udeb
stable/main/binary-m68k/debootstrap_0.1.17.7woody1_m68k.deb
debootstrap (0.1.17.7woody1) stable; urgency=medium
  * NMU
  * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing
    package dependency fixes, among others.
  * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is
    newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8
    are still straightforward.


stable/main/binary-ia64/debootstrap_0.1.17.7woody1_ia64.deb
stable/main/binary-ia64/debootstrap-udeb_0.1.17.7woody1_ia64.udeb
debootstrap (0.1.17.7woody1) stable; urgency=medium
  * NMU
  * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing
    package dependency fixes, among others.
  * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is
    newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8
    are still straightforward.


stable/main/binary-hppa/debootstrap-udeb_0.1.17.7woody1_hppa.udeb
stable/main/binary-hppa/debootstrap_0.1.17.7woody1_hppa.deb
debootstrap (0.1.17.7woody1) stable; urgency=medium
  * NMU
  * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing
    package dependency fixes, among others.
  * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is
    newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8
    are still straightforward.


stable/main/binary-arm/debootstrap_0.1.17.7woody1_arm.deb
stable/main/binary-arm/debootstrap-udeb_0.1.17.7woody1_arm.udeb
debootstrap (0.1.17.7woody1) stable; urgency=medium
  * NMU
  * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing
    package dependency fixes, among others.
  * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is
    newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8
    are still straightforward.


stable/main/binary-alpha/debootstrap-udeb_0.1.17.7woody1_alpha.udeb
stable/main/binary-alpha/debootstrap_0.1.17.7woody1_alpha.deb
debootstrap (0.1.17.7woody1) stable; urgency=medium
  * NMU
  * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing
    package dependency fixes, among others.
  * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is
    newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8
    are still straightforward.


stable/main/binary-i386/debootstrap_0.1.17.7woody1_i386.deb
stable/main/binary-i386/debootstrap-udeb_0.1.17.7woody1_i386.udeb
stable/main/source/debootstrap_0.1.17.7woody1.dsc
stable/main/source/debootstrap_0.1.17.7woody1.tar.gz
debootstrap (0.1.17.7woody1) stable; urgency=medium
  * NMU
  * Rebuild of 0.1.17.8 for woody to pull in race condition fix and missing
    package dependency fixes, among others.
  * NMU versioned the way it is so that dpkg doesn't think 0.1.17.[1-7] is
    newer than this release, but "upgrades" (actually sidegrades) to 0.1.17.8
    are still straightforward.


stable/main/binary-sparc/libsasl-krb4-mit_1.5.24-15woody3_sparc.deb
stable/main/binary-sparc/libsasl-gssapi-mit_1.5.24-15woody3_sparc.deb
cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-s390/libsasl-krb4-mit_1.5.24-15woody3_s390.deb
stable/main/binary-s390/libsasl-gssapi-mit_1.5.24-15woody3_s390.deb
cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-powerpc/libsasl-krb4-mit_1.5.24-15woody3_powerpc.deb
stable/main/binary-powerpc/libsasl-gssapi-mit_1.5.24-15woody3_powerpc.deb
cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-mipsel/libsasl-gssapi-mit_1.5.24-15woody3_mipsel.deb
stable/main/binary-mipsel/libsasl-krb4-mit_1.5.24-15woody3_mipsel.deb
cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-mips/libsasl-gssapi-mit_1.5.24-15woody3_mips.deb
stable/main/binary-mips/libsasl-krb4-mit_1.5.24-15woody3_mips.deb
cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-m68k/libsasl-krb4-mit_1.5.24-15woody3_m68k.deb
stable/main/binary-m68k/libsasl-gssapi-mit_1.5.24-15woody3_m68k.deb
cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-ia64/libsasl-gssapi-mit_1.5.24-15woody3_ia64.deb
stable/main/binary-ia64/libsasl-krb4-mit_1.5.24-15woody3_ia64.deb
cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-hppa/libsasl-gssapi-mit_1.5.24-15woody3_hppa.deb
stable/main/binary-hppa/libsasl-krb4-mit_1.5.24-15woody3_hppa.deb
cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-arm/libsasl-gssapi-mit_1.5.24-15woody3_arm.deb
stable/main/binary-arm/libsasl-krb4-mit_1.5.24-15woody3_arm.deb
cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-alpha/libsasl-krb4-mit_1.5.24-15woody3_alpha.deb
stable/main/binary-alpha/libsasl-gssapi-mit_1.5.24-15woody3_alpha.deb
cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-i386/libsasl-gssapi-mit_1.5.24-15woody3_i386.deb
stable/main/source/cyrus-sasl-mit_1.5.24-15woody3.dsc
stable/main/source/cyrus-sasl-mit_1.5.24-15woody3.diff.gz
stable/main/binary-i386/libsasl-krb4-mit_1.5.24-15woody3_i386.deb
cyrus-sasl-mit (1.5.24-15woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-sparc/libsasl-digestmd5-plain_1.5.27-3.1woody5_sparc.deb
stable/main/binary-sparc/sasl-bin_1.5.27-3.1woody5_sparc.deb
stable/main/binary-sparc/libsasl-modules-plain_1.5.27-3.1woody5_sparc.deb
stable/main/binary-sparc/libsasl7_1.5.27-3.1woody5_sparc.deb
stable/main/binary-sparc/libsasl-dev_1.5.27-3.1woody5_sparc.deb
cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-s390/sasl-bin_1.5.27-3.1woody5_s390.deb
stable/main/binary-s390/libsasl-modules-plain_1.5.27-3.1woody5_s390.deb
stable/main/binary-s390/libsasl7_1.5.27-3.1woody5_s390.deb
stable/main/binary-s390/libsasl-dev_1.5.27-3.1woody5_s390.deb
stable/main/binary-s390/libsasl-digestmd5-plain_1.5.27-3.1woody5_s390.deb
cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-powerpc/libsasl-digestmd5-plain_1.5.27-3.1woody5_powerpc.deb
stable/main/binary-powerpc/libsasl-modules-plain_1.5.27-3.1woody5_powerpc.deb
stable/main/binary-powerpc/libsasl-dev_1.5.27-3.1woody5_powerpc.deb
stable/main/binary-powerpc/libsasl7_1.5.27-3.1woody5_powerpc.deb
stable/main/binary-powerpc/sasl-bin_1.5.27-3.1woody5_powerpc.deb
cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-mipsel/libsasl-dev_1.5.27-3.1woody5_mipsel.deb
stable/main/binary-mipsel/libsasl-digestmd5-plain_1.5.27-3.1woody5_mipsel.deb
stable/main/binary-mipsel/sasl-bin_1.5.27-3.1woody5_mipsel.deb
stable/main/binary-mipsel/libsasl7_1.5.27-3.1woody5_mipsel.deb
stable/main/binary-mipsel/libsasl-modules-plain_1.5.27-3.1woody5_mipsel.deb
cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-mips/libsasl-dev_1.5.27-3.1woody5_mips.deb
stable/main/binary-mips/libsasl-modules-plain_1.5.27-3.1woody5_mips.deb
stable/main/binary-mips/libsasl-digestmd5-plain_1.5.27-3.1woody5_mips.deb
stable/main/binary-mips/sasl-bin_1.5.27-3.1woody5_mips.deb
stable/main/binary-mips/libsasl7_1.5.27-3.1woody5_mips.deb
cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-m68k/libsasl-digestmd5-plain_1.5.27-3.1woody5_m68k.deb
stable/main/binary-m68k/libsasl-modules-plain_1.5.27-3.1woody5_m68k.deb
stable/main/binary-m68k/libsasl7_1.5.27-3.1woody5_m68k.deb
stable/main/binary-m68k/libsasl-dev_1.5.27-3.1woody5_m68k.deb
stable/main/binary-m68k/sasl-bin_1.5.27-3.1woody5_m68k.deb
cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-ia64/libsasl-dev_1.5.27-3.1woody5_ia64.deb
stable/main/binary-ia64/libsasl7_1.5.27-3.1woody5_ia64.deb
stable/main/binary-ia64/libsasl-modules-plain_1.5.27-3.1woody5_ia64.deb
stable/main/binary-ia64/sasl-bin_1.5.27-3.1woody5_ia64.deb
stable/main/binary-ia64/libsasl-digestmd5-plain_1.5.27-3.1woody5_ia64.deb
cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-hppa/libsasl-digestmd5-plain_1.5.27-3.1woody5_hppa.deb
stable/main/binary-hppa/libsasl-dev_1.5.27-3.1woody5_hppa.deb
stable/main/binary-hppa/sasl-bin_1.5.27-3.1woody5_hppa.deb
stable/main/binary-hppa/libsasl-modules-plain_1.5.27-3.1woody5_hppa.deb
stable/main/binary-hppa/libsasl7_1.5.27-3.1woody5_hppa.deb
cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-arm/sasl-bin_1.5.27-3.1woody5_arm.deb
stable/main/binary-arm/libsasl7_1.5.27-3.1woody5_arm.deb
stable/main/binary-arm/libsasl-modules-plain_1.5.27-3.1woody5_arm.deb
stable/main/binary-arm/libsasl-dev_1.5.27-3.1woody5_arm.deb
stable/main/binary-arm/libsasl-digestmd5-plain_1.5.27-3.1woody5_arm.deb
cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-alpha/sasl-bin_1.5.27-3.1woody5_alpha.deb
stable/main/binary-alpha/libsasl7_1.5.27-3.1woody5_alpha.deb
stable/main/binary-alpha/libsasl-modules-plain_1.5.27-3.1woody5_alpha.deb
stable/main/binary-alpha/libsasl-dev_1.5.27-3.1woody5_alpha.deb
stable/main/binary-alpha/libsasl-digestmd5-plain_1.5.27-3.1woody5_alpha.deb
cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-i386/libsasl-dev_1.5.27-3.1woody5_i386.deb
stable/main/binary-i386/libsasl7_1.5.27-3.1woody5_i386.deb
stable/main/binary-i386/libsasl-modules-plain_1.5.27-3.1woody5_i386.deb
stable/main/binary-i386/libsasl-digestmd5-plain_1.5.27-3.1woody5_i386.deb
stable/main/source/cyrus-sasl_1.5.27-3.1woody5.dsc
stable/main/binary-i386/sasl-bin_1.5.27-3.1woody5_i386.deb
stable/main/source/cyrus-sasl_1.5.27-3.1woody5.diff.gz
cyrus-sasl (1.5.27-3.1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Ensure that path is set to NULL if it isn't utilised through the
    environment variable.  Thanks to Peter Stelmachovic <stelmo@savba.sk>
    for spotting this.


stable/main/binary-sparc/cvs_1.11.1p1debian-9woody7_sparc.deb
cvs (1.11.1p1debian-9woody7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert
    Price to fix security problems:
    - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416]
    - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417]
    - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418]


stable/main/binary-s390/cvs_1.11.1p1debian-9woody7_s390.deb
cvs (1.11.1p1debian-9woody7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert
    Price to fix security problems:
    - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416]
    - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417]
    - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418]


stable/main/binary-powerpc/cvs_1.11.1p1debian-9woody7_powerpc.deb
cvs (1.11.1p1debian-9woody7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert
    Price to fix security problems:
    - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416]
    - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417]
    - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418]


stable/main/binary-mipsel/cvs_1.11.1p1debian-9woody7_mipsel.deb
cvs (1.11.1p1debian-9woody7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert
    Price to fix security problems:
    - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416]
    - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417]
    - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418]


stable/main/binary-mips/cvs_1.11.1p1debian-9woody7_mips.deb
cvs (1.11.1p1debian-9woody7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert
    Price to fix security problems:
    - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416]
    - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417]
    - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418]


stable/main/binary-m68k/cvs_1.11.1p1debian-9woody7_m68k.deb
cvs (1.11.1p1debian-9woody7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert
    Price to fix security problems:
    - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416]
    - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417]
    - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418]


stable/main/binary-ia64/cvs_1.11.1p1debian-9woody7_ia64.deb
cvs (1.11.1p1debian-9woody7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert
    Price to fix security problems:
    - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416]
    - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417]
    - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418]


stable/main/binary-hppa/cvs_1.11.1p1debian-9woody7_hppa.deb
cvs (1.11.1p1debian-9woody7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert
    Price to fix security problems:
    - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416]
    - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417]
    - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418]


stable/main/binary-arm/cvs_1.11.1p1debian-9woody7_arm.deb
cvs (1.11.1p1debian-9woody7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert
    Price to fix security problems:
    - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416]
    - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417]
    - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418]


stable/main/binary-alpha/cvs_1.11.1p1debian-9woody7_alpha.deb
cvs (1.11.1p1debian-9woody7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert
    Price to fix security problems:
    - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416]
    - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417]
    - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418]


stable/main/binary-i386/cvs_1.11.1p1debian-9woody7_i386.deb
stable/main/source/cvs_1.11.1p1debian-9woody7.dsc
stable/main/source/cvs_1.11.1p1debian-9woody7.diff.gz
cvs (1.11.1p1debian-9woody7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patches by Sebastian Krahmer, Stefan Esser and Derek Robert
    Price to fix security problems:
    - CAN-2004-0416: double-free() [debian/patches/66_CAN-2004-0416]
    - CAN-2004-0417: integer overflow [debian/patches/66_CAN-2004-0417]
    - CAN-2004-0418: out of bound writes [debian/patches/66_CAN-2004-0418]


stable/main/binary-sparc/cupsys_1.1.14-5woody10_sparc.deb
stable/main/binary-sparc/cupsys-bsd_1.1.14-5woody10_sparc.deb
stable/main/binary-sparc/libcupsys2-dev_1.1.14-5woody10_sparc.deb
stable/main/binary-sparc/cupsys-pstoraster_1.1.14-5woody10_sparc.deb
stable/main/binary-sparc/cupsys-client_1.1.14-5woody10_sparc.deb
stable/main/binary-sparc/libcupsys2_1.1.14-5woody10_sparc.deb
cupsys (1.1.14-5woody10) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added another buffer overflow protection that was discovered missing
    by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888]


stable/main/binary-s390/cupsys_1.1.14-5woody10_s390.deb
stable/main/binary-s390/cupsys-client_1.1.14-5woody10_s390.deb
stable/main/binary-s390/libcupsys2_1.1.14-5woody10_s390.deb
stable/main/binary-s390/cupsys-pstoraster_1.1.14-5woody10_s390.deb
stable/main/binary-s390/libcupsys2-dev_1.1.14-5woody10_s390.deb
stable/main/binary-s390/cupsys-bsd_1.1.14-5woody10_s390.deb
cupsys (1.1.14-5woody10) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added another buffer overflow protection that was discovered missing
    by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888]


stable/main/binary-powerpc/libcupsys2-dev_1.1.14-5woody10_powerpc.deb
stable/main/binary-powerpc/cupsys-bsd_1.1.14-5woody10_powerpc.deb
stable/main/binary-powerpc/cupsys-pstoraster_1.1.14-5woody10_powerpc.deb
stable/main/binary-powerpc/cupsys-client_1.1.14-5woody10_powerpc.deb
stable/main/binary-powerpc/cupsys_1.1.14-5woody10_powerpc.deb
stable/main/binary-powerpc/libcupsys2_1.1.14-5woody10_powerpc.deb
cupsys (1.1.14-5woody10) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added another buffer overflow protection that was discovered missing
    by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888]


stable/main/binary-mipsel/libcupsys2-dev_1.1.14-5woody10_mipsel.deb
stable/main/binary-mipsel/cupsys-client_1.1.14-5woody10_mipsel.deb
stable/main/binary-mipsel/cupsys_1.1.14-5woody10_mipsel.deb
stable/main/binary-mipsel/libcupsys2_1.1.14-5woody10_mipsel.deb
stable/main/binary-mipsel/cupsys-pstoraster_1.1.14-5woody10_mipsel.deb
stable/main/binary-mipsel/cupsys-bsd_1.1.14-5woody10_mipsel.deb
cupsys (1.1.14-5woody10) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added another buffer overflow protection that was discovered missing
    by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888]


stable/main/binary-mips/cupsys-pstoraster_1.1.14-5woody10_mips.deb
stable/main/binary-mips/cupsys_1.1.14-5woody10_mips.deb
stable/main/binary-mips/cupsys-client_1.1.14-5woody10_mips.deb
stable/main/binary-mips/libcupsys2-dev_1.1.14-5woody10_mips.deb
stable/main/binary-mips/libcupsys2_1.1.14-5woody10_mips.deb
stable/main/binary-mips/cupsys-bsd_1.1.14-5woody10_mips.deb
cupsys (1.1.14-5woody10) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added another buffer overflow protection that was discovered missing
    by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888]


stable/main/binary-m68k/cupsys-pstoraster_1.1.14-5woody10_m68k.deb
stable/main/binary-m68k/libcupsys2-dev_1.1.14-5woody10_m68k.deb
stable/main/binary-m68k/cupsys_1.1.14-5woody10_m68k.deb
stable/main/binary-m68k/cupsys-client_1.1.14-5woody10_m68k.deb
stable/main/binary-m68k/cupsys-bsd_1.1.14-5woody10_m68k.deb
stable/main/binary-m68k/libcupsys2_1.1.14-5woody10_m68k.deb
cupsys (1.1.14-5woody10) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added another buffer overflow protection that was discovered missing
    by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888]


stable/main/binary-ia64/libcupsys2-dev_1.1.14-5woody10_ia64.deb
stable/main/binary-ia64/cupsys_1.1.14-5woody10_ia64.deb
stable/main/binary-ia64/cupsys-client_1.1.14-5woody10_ia64.deb
stable/main/binary-ia64/cupsys-pstoraster_1.1.14-5woody10_ia64.deb
stable/main/binary-ia64/cupsys-bsd_1.1.14-5woody10_ia64.deb
stable/main/binary-ia64/libcupsys2_1.1.14-5woody10_ia64.deb
cupsys (1.1.14-5woody10) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added another buffer overflow protection that was discovered missing
    by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888]


stable/main/binary-hppa/cupsys-pstoraster_1.1.14-5woody10_hppa.deb
stable/main/binary-hppa/cupsys-client_1.1.14-5woody10_hppa.deb
stable/main/binary-hppa/cupsys_1.1.14-5woody10_hppa.deb
stable/main/binary-hppa/cupsys-bsd_1.1.14-5woody10_hppa.deb
stable/main/binary-hppa/libcupsys2-dev_1.1.14-5woody10_hppa.deb
stable/main/binary-hppa/libcupsys2_1.1.14-5woody10_hppa.deb
cupsys (1.1.14-5woody10) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added another buffer overflow protection that was discovered missing
    by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888]


stable/main/binary-arm/libcupsys2_1.1.14-5woody10_arm.deb
stable/main/binary-arm/libcupsys2-dev_1.1.14-5woody10_arm.deb
stable/main/binary-arm/cupsys-bsd_1.1.14-5woody10_arm.deb
stable/main/binary-arm/cupsys-pstoraster_1.1.14-5woody10_arm.deb
stable/main/binary-arm/cupsys_1.1.14-5woody10_arm.deb
stable/main/binary-arm/cupsys-client_1.1.14-5woody10_arm.deb
cupsys (1.1.14-5woody10) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added another buffer overflow protection that was discovered missing
    by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888]


stable/main/binary-alpha/libcupsys2_1.1.14-5woody10_alpha.deb
stable/main/binary-alpha/cupsys_1.1.14-5woody10_alpha.deb
stable/main/binary-alpha/libcupsys2-dev_1.1.14-5woody10_alpha.deb
stable/main/binary-alpha/cupsys-pstoraster_1.1.14-5woody10_alpha.deb
stable/main/binary-alpha/cupsys-bsd_1.1.14-5woody10_alpha.deb
stable/main/binary-alpha/cupsys-client_1.1.14-5woody10_alpha.deb
cupsys (1.1.14-5woody10) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added another buffer overflow protection that was discovered missing
    by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888]


stable/main/binary-i386/cupsys-bsd_1.1.14-5woody10_i386.deb
stable/main/binary-i386/cupsys-client_1.1.14-5woody10_i386.deb
stable/main/binary-i386/cupsys_1.1.14-5woody10_i386.deb
stable/main/binary-i386/libcupsys2_1.1.14-5woody10_i386.deb
stable/main/source/cupsys_1.1.14-5woody10.dsc
stable/main/binary-i386/cupsys-pstoraster_1.1.14-5woody10_i386.deb
stable/main/source/cupsys_1.1.14-5woody10.diff.gz
stable/main/binary-i386/libcupsys2-dev_1.1.14-5woody10_i386.deb
cupsys (1.1.14-5woody10) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added another buffer overflow protection that was discovered missing
    by Marcus Meissner [pdftops/Catalog.cxx, pdftops/XRef.cxx, CAN-2004-0888]


stable/main/binary-sparc/crawl_4.0.0beta23-2woody1_sparc.deb
crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix potential local security hole due to improper use of environmental
    variable which may allow local GID(games) compromise.


stable/main/binary-s390/crawl_4.0.0beta23-2woody1_s390.deb
crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix potential local security hole due to improper use of environmental
    variable which may allow local GID(games) compromise.


stable/main/binary-powerpc/crawl_4.0.0beta23-2woody1_powerpc.deb
crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix potential local security hole due to improper use of environmental
    variable which may allow local GID(games) compromise.


stable/main/binary-mipsel/crawl_4.0.0beta23-2woody1_mipsel.deb
crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix potential local security hole due to improper use of environmental
    variable which may allow local GID(games) compromise.


stable/main/binary-mips/crawl_4.0.0beta23-2woody1_mips.deb
crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix potential local security hole due to improper use of environmental
    variable which may allow local GID(games) compromise.


stable/main/binary-m68k/crawl_4.0.0beta23-2woody1_m68k.deb
crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix potential local security hole due to improper use of environmental
    variable which may allow local GID(games) compromise.


stable/main/binary-ia64/crawl_4.0.0beta23-2woody1_ia64.deb
crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix potential local security hole due to improper use of environmental
    variable which may allow local GID(games) compromise.


stable/main/binary-hppa/crawl_4.0.0beta23-2woody1_hppa.deb
crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix potential local security hole due to improper use of environmental
    variable which may allow local GID(games) compromise.


stable/main/binary-arm/crawl_4.0.0beta23-2woody1_arm.deb
crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix potential local security hole due to improper use of environmental
    variable which may allow local GID(games) compromise.


stable/main/binary-alpha/crawl_4.0.0beta23-2woody1_alpha.deb
crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix potential local security hole due to improper use of environmental
    variable which may allow local GID(games) compromise.


stable/main/source/crawl_4.0.0beta23-2woody1.diff.gz
stable/main/binary-i386/crawl_4.0.0beta23-2woody1_i386.deb
stable/main/source/crawl_4.0.0beta23-2woody1.dsc
crawl (1:4.0.0beta23-2woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team.
  * Fix potential local security hole due to improper use of environmental
    variable which may allow local GID(games) compromise.


stable/main/binary-sparc/courier-base_0.37.3-2.5_sparc.deb
stable/main/binary-sparc/courier-maildrop_0.37.3-2.5_sparc.deb
stable/main/binary-sparc/courier-ldap_0.37.3-2.5_sparc.deb
stable/main/binary-sparc/courier-authdaemon_0.37.3-2.5_sparc.deb
stable/main/binary-sparc/courier-authmysql_0.37.3-2.5_sparc.deb
stable/main/binary-sparc/courier-mta_0.37.3-2.5_sparc.deb
stable/main/binary-sparc/courier-pcp_0.37.3-2.5_sparc.deb
stable/main/binary-sparc/courier-pop_0.37.3-2.5_sparc.deb
stable/main/binary-sparc/courier-webadmin_0.37.3-2.5_sparc.deb
stable/main/binary-sparc/courier-debug_0.37.3-2.5_sparc.deb
stable/main/binary-sparc/courier-mlm_0.37.3-2.5_sparc.deb
stable/main/binary-sparc/sqwebmail_0.37.3-2.5_sparc.deb
stable/main/binary-sparc/courier-imap_1.4.3-2.5_sparc.deb
courier (0.37.3-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number


stable/main/binary-s390/courier-authmysql_0.37.3-2.5_s390.deb
stable/main/binary-s390/courier-pop_0.37.3-2.5_s390.deb
stable/main/binary-s390/courier-ldap_0.37.3-2.5_s390.deb
stable/main/binary-s390/courier-debug_0.37.3-2.5_s390.deb
stable/main/binary-s390/courier-imap_1.4.3-2.5_s390.deb
stable/main/binary-s390/courier-pcp_0.37.3-2.5_s390.deb
stable/main/binary-s390/courier-webadmin_0.37.3-2.5_s390.deb
stable/main/binary-s390/sqwebmail_0.37.3-2.5_s390.deb
stable/main/binary-s390/courier-base_0.37.3-2.5_s390.deb
stable/main/binary-s390/courier-authdaemon_0.37.3-2.5_s390.deb
stable/main/binary-s390/courier-maildrop_0.37.3-2.5_s390.deb
stable/main/binary-s390/courier-mta_0.37.3-2.5_s390.deb
stable/main/binary-s390/courier-mlm_0.37.3-2.5_s390.deb
courier (0.37.3-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number


stable/main/binary-powerpc/courier-mlm_0.37.3-2.5_powerpc.deb
stable/main/binary-powerpc/sqwebmail_0.37.3-2.5_powerpc.deb
stable/main/binary-powerpc/courier-base_0.37.3-2.5_powerpc.deb
stable/main/binary-powerpc/courier-authmysql_0.37.3-2.5_powerpc.deb
stable/main/binary-powerpc/courier-pop_0.37.3-2.5_powerpc.deb
stable/main/binary-powerpc/courier-webadmin_0.37.3-2.5_powerpc.deb
stable/main/binary-powerpc/courier-debug_0.37.3-2.5_powerpc.deb
stable/main/binary-powerpc/courier-ldap_0.37.3-2.5_powerpc.deb
stable/main/binary-powerpc/courier-authdaemon_0.37.3-2.5_powerpc.deb
stable/main/binary-powerpc/courier-mta_0.37.3-2.5_powerpc.deb
stable/main/binary-powerpc/courier-imap_1.4.3-2.5_powerpc.deb
stable/main/binary-powerpc/courier-pcp_0.37.3-2.5_powerpc.deb
stable/main/binary-powerpc/courier-maildrop_0.37.3-2.5_powerpc.deb
courier (0.37.3-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number


stable/main/binary-mipsel/courier-ldap_0.37.3-2.5_mipsel.deb
stable/main/binary-mipsel/courier-debug_0.37.3-2.5_mipsel.deb
stable/main/binary-mipsel/courier-authmysql_0.37.3-2.5_mipsel.deb
stable/main/binary-mipsel/courier-mta_0.37.3-2.5_mipsel.deb
stable/main/binary-mipsel/courier-webadmin_0.37.3-2.5_mipsel.deb
stable/main/binary-mipsel/courier-base_0.37.3-2.5_mipsel.deb
stable/main/binary-mipsel/courier-imap_1.4.3-2.5_mipsel.deb
stable/main/binary-mipsel/courier-pcp_0.37.3-2.5_mipsel.deb
stable/main/binary-mipsel/sqwebmail_0.37.3-2.5_mipsel.deb
stable/main/binary-mipsel/courier-pop_0.37.3-2.5_mipsel.deb
stable/main/binary-mipsel/courier-authdaemon_0.37.3-2.5_mipsel.deb
stable/main/binary-mipsel/courier-maildrop_0.37.3-2.5_mipsel.deb
stable/main/binary-mipsel/courier-mlm_0.37.3-2.5_mipsel.deb
courier (0.37.3-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number


stable/main/binary-mips/courier-maildrop_0.37.3-2.5_mips.deb
stable/main/binary-mips/courier-pop_0.37.3-2.5_mips.deb
stable/main/binary-mips/courier-webadmin_0.37.3-2.5_mips.deb
stable/main/binary-mips/courier-mta_0.37.3-2.5_mips.deb
stable/main/binary-mips/courier-mlm_0.37.3-2.5_mips.deb
stable/main/binary-mips/courier-authmysql_0.37.3-2.5_mips.deb
stable/main/binary-mips/courier-base_0.37.3-2.5_mips.deb
stable/main/binary-mips/courier-authdaemon_0.37.3-2.5_mips.deb
stable/main/binary-mips/sqwebmail_0.37.3-2.5_mips.deb
stable/main/binary-mips/courier-ldap_0.37.3-2.5_mips.deb
stable/main/binary-mips/courier-debug_0.37.3-2.5_mips.deb
stable/main/binary-mips/courier-imap_1.4.3-2.5_mips.deb
stable/main/binary-mips/courier-pcp_0.37.3-2.5_mips.deb
courier (0.37.3-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number


stable/main/binary-m68k/courier-base_0.37.3-2.5_m68k.deb
stable/main/binary-m68k/courier-maildrop_0.37.3-2.5_m68k.deb
stable/main/binary-m68k/courier-webadmin_0.37.3-2.5_m68k.deb
stable/main/binary-m68k/courier-authmysql_0.37.3-2.5_m68k.deb
stable/main/binary-m68k/sqwebmail_0.37.3-2.5_m68k.deb
stable/main/binary-m68k/courier-mlm_0.37.3-2.5_m68k.deb
stable/main/binary-m68k/courier-mta_0.37.3-2.5_m68k.deb
stable/main/binary-m68k/courier-debug_0.37.3-2.5_m68k.deb
stable/main/binary-m68k/courier-pcp_0.37.3-2.5_m68k.deb
stable/main/binary-m68k/courier-imap_1.4.3-2.5_m68k.deb
stable/main/binary-m68k/courier-pop_0.37.3-2.5_m68k.deb
stable/main/binary-m68k/courier-ldap_0.37.3-2.5_m68k.deb
stable/main/binary-m68k/courier-authdaemon_0.37.3-2.5_m68k.deb
courier (0.37.3-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number


stable/main/binary-ia64/courier-webadmin_0.37.3-2.5_ia64.deb
stable/main/binary-ia64/courier-pop_0.37.3-2.5_ia64.deb
stable/main/binary-ia64/sqwebmail_0.37.3-2.5_ia64.deb
stable/main/binary-ia64/courier-debug_0.37.3-2.5_ia64.deb
stable/main/binary-ia64/courier-mlm_0.37.3-2.5_ia64.deb
stable/main/binary-ia64/courier-mta_0.37.3-2.5_ia64.deb
stable/main/binary-ia64/courier-maildrop_0.37.3-2.5_ia64.deb
stable/main/binary-ia64/courier-base_0.37.3-2.5_ia64.deb
stable/main/binary-ia64/courier-authmysql_0.37.3-2.5_ia64.deb
stable/main/binary-ia64/courier-imap_1.4.3-2.5_ia64.deb
stable/main/binary-ia64/courier-authdaemon_0.37.3-2.5_ia64.deb
stable/main/binary-ia64/courier-ldap_0.37.3-2.5_ia64.deb
stable/main/binary-ia64/courier-pcp_0.37.3-2.5_ia64.deb
courier (0.37.3-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number


stable/main/binary-hppa/sqwebmail_0.37.3-2.5_hppa.deb
stable/main/binary-hppa/courier-imap_1.4.3-2.5_hppa.deb
stable/main/binary-hppa/courier-ldap_0.37.3-2.5_hppa.deb
stable/main/binary-hppa/courier-authmysql_0.37.3-2.5_hppa.deb
stable/main/binary-hppa/courier-webadmin_0.37.3-2.5_hppa.deb
stable/main/binary-hppa/courier-debug_0.37.3-2.5_hppa.deb
stable/main/binary-hppa/courier-mlm_0.37.3-2.5_hppa.deb
stable/main/binary-hppa/courier-mta_0.37.3-2.5_hppa.deb
stable/main/binary-hppa/courier-authdaemon_0.37.3-2.5_hppa.deb
stable/main/binary-hppa/courier-pcp_0.37.3-2.5_hppa.deb
stable/main/binary-hppa/courier-base_0.37.3-2.5_hppa.deb
stable/main/binary-hppa/courier-pop_0.37.3-2.5_hppa.deb
stable/main/binary-hppa/courier-maildrop_0.37.3-2.5_hppa.deb
courier (0.37.3-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number


stable/main/binary-arm/courier-maildrop_0.37.3-2.5_arm.deb
stable/main/binary-arm/courier-imap_1.4.3-2.5_arm.deb
stable/main/binary-arm/courier-debug_0.37.3-2.5_arm.deb
stable/main/binary-arm/courier-ldap_0.37.3-2.5_arm.deb
stable/main/binary-arm/courier-authmysql_0.37.3-2.5_arm.deb
stable/main/binary-arm/sqwebmail_0.37.3-2.5_arm.deb
stable/main/binary-arm/courier-mlm_0.37.3-2.5_arm.deb
stable/main/binary-arm/courier-pcp_0.37.3-2.5_arm.deb
stable/main/binary-arm/courier-authdaemon_0.37.3-2.5_arm.deb
stable/main/binary-arm/courier-mta_0.37.3-2.5_arm.deb
stable/main/binary-arm/courier-pop_0.37.3-2.5_arm.deb
stable/main/binary-arm/courier-base_0.37.3-2.5_arm.deb
stable/main/binary-arm/courier-webadmin_0.37.3-2.5_arm.deb
courier (0.37.3-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number


stable/main/binary-alpha/courier-authmysql_0.37.3-2.5_alpha.deb
stable/main/binary-alpha/courier-authdaemon_0.37.3-2.5_alpha.deb
stable/main/binary-alpha/courier-maildrop_0.37.3-2.5_alpha.deb
stable/main/binary-alpha/courier-mta_0.37.3-2.5_alpha.deb
stable/main/binary-alpha/courier-mlm_0.37.3-2.5_alpha.deb
stable/main/binary-alpha/courier-pcp_0.37.3-2.5_alpha.deb
stable/main/binary-alpha/courier-ldap_0.37.3-2.5_alpha.deb
stable/main/binary-alpha/courier-webadmin_0.37.3-2.5_alpha.deb
stable/main/binary-alpha/sqwebmail_0.37.3-2.5_alpha.deb
stable/main/binary-alpha/courier-imap_1.4.3-2.5_alpha.deb
stable/main/binary-alpha/courier-debug_0.37.3-2.5_alpha.deb
stable/main/binary-alpha/courier-base_0.37.3-2.5_alpha.deb
stable/main/binary-alpha/courier-pop_0.37.3-2.5_alpha.deb
courier (0.37.3-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number


stable/main/binary-i386/courier-authdaemon_0.37.3-2.5_i386.deb
stable/main/binary-i386/courier-debug_0.37.3-2.5_i386.deb
stable/main/binary-i386/courier-mta_0.37.3-2.5_i386.deb
stable/main/source/courier_0.37.3-2.5.diff.gz
stable/main/binary-i386/sqwebmail_0.37.3-2.5_i386.deb
stable/main/binary-i386/courier-base_0.37.3-2.5_i386.deb
stable/main/binary-i386/courier-ldap_0.37.3-2.5_i386.deb
stable/main/binary-i386/courier-pcp_0.37.3-2.5_i386.deb
stable/main/binary-i386/courier-authmysql_0.37.3-2.5_i386.deb
stable/main/binary-i386/courier-webadmin_0.37.3-2.5_i386.deb
stable/main/binary-i386/courier-mlm_0.37.3-2.5_i386.deb
stable/main/binary-i386/courier-pop_0.37.3-2.5_i386.deb
stable/main/binary-i386/courier-imap_1.4.3-2.5_i386.deb
stable/main/binary-i386/courier-maildrop_0.37.3-2.5_i386.deb
stable/main/source/courier_0.37.3-2.5.dsc
stable/main/binary-all/courier-doc_0.37.3-2.5_all.deb
courier (0.37.3-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number


stable/main/binary-s390/conquest_7.1.1-6woody2_s390.deb
conquest (7.1.1-6woody2) stable; urgency=medium
  * Fix group-checking in postinst and postrm.  closes: #220650.


stable/main/binary-powerpc/conquest_7.1.1-6woody2_powerpc.deb
conquest (7.1.1-6woody2) stable; urgency=medium
  * Fix group-checking in postinst and postrm.  closes: #220650.


stable/main/binary-mipsel/conquest_7.1.1-6woody2_mipsel.deb
conquest (7.1.1-6woody2) stable; urgency=medium
  * Fix group-checking in postinst and postrm.  closes: #220650.


stable/main/binary-mips/conquest_7.1.1-6woody2_mips.deb
conquest (7.1.1-6woody2) stable; urgency=medium
  * Fix group-checking in postinst and postrm.  closes: #220650.


stable/main/binary-m68k/conquest_7.1.1-6woody2_m68k.deb
conquest (7.1.1-6woody2) stable; urgency=medium
  * Fix group-checking in postinst and postrm.  closes: #220650.


stable/main/binary-ia64/conquest_7.1.1-6woody2_ia64.deb
conquest (7.1.1-6woody2) stable; urgency=medium
  * Fix group-checking in postinst and postrm.  closes: #220650.


stable/main/binary-i386/conquest_7.1.1-6woody2_i386.deb
conquest (7.1.1-6woody2) stable; urgency=medium
  * Fix group-checking in postinst and postrm.  closes: #220650.


stable/main/binary-hppa/conquest_7.1.1-6woody2_hppa.deb
conquest (7.1.1-6woody2) stable; urgency=medium
  * Fix group-checking in postinst and postrm.  closes: #220650.


stable/main/binary-arm/conquest_7.1.1-6woody2_arm.deb
conquest (7.1.1-6woody2) stable; urgency=medium
  * Fix group-checking in postinst and postrm.  closes: #220650.


stable/main/binary-alpha/conquest_7.1.1-6woody2_alpha.deb
conquest (7.1.1-6woody2) stable; urgency=medium
  * Fix group-checking in postinst and postrm.  closes: #220650.


stable/main/source/conquest_7.1.1-6woody2.diff.gz
stable/main/binary-sparc/conquest_7.1.1-6woody2_sparc.deb
stable/main/source/conquest_7.1.1-6woody2.dsc
conquest (7.1.1-6woody2) stable; urgency=medium
  * Fix group-checking in postinst and postrm.  closes: #220650.


stable/main/binary-sparc/cgiemail_1.6-14woody1_sparc.deb
cgiemail (1.6-14woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Filter nonprintable characters from parameters to prevent unauthorized use
    for transmitting email to arbitrary addresses (Closes: #222870)
    (CAN-2002-1575)


stable/main/binary-s390/cgiemail_1.6-14woody1_s390.deb
cgiemail (1.6-14woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Filter nonprintable characters from parameters to prevent unauthorized use
    for transmitting email to arbitrary addresses (Closes: #222870)
    (CAN-2002-1575)


stable/main/binary-powerpc/cgiemail_1.6-14woody1_powerpc.deb
cgiemail (1.6-14woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Filter nonprintable characters from parameters to prevent unauthorized use
    for transmitting email to arbitrary addresses (Closes: #222870)
    (CAN-2002-1575)


stable/main/binary-mipsel/cgiemail_1.6-14woody1_mipsel.deb
cgiemail (1.6-14woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Filter nonprintable characters from parameters to prevent unauthorized use
    for transmitting email to arbitrary addresses (Closes: #222870)
    (CAN-2002-1575)


stable/main/binary-mips/cgiemail_1.6-14woody1_mips.deb
cgiemail (1.6-14woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Filter nonprintable characters from parameters to prevent unauthorized use
    for transmitting email to arbitrary addresses (Closes: #222870)
    (CAN-2002-1575)


stable/main/binary-m68k/cgiemail_1.6-14woody1_m68k.deb
cgiemail (1.6-14woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Filter nonprintable characters from parameters to prevent unauthorized use
    for transmitting email to arbitrary addresses (Closes: #222870)
    (CAN-2002-1575)


stable/main/binary-ia64/cgiemail_1.6-14woody1_ia64.deb
cgiemail (1.6-14woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Filter nonprintable characters from parameters to prevent unauthorized use
    for transmitting email to arbitrary addresses (Closes: #222870)
    (CAN-2002-1575)


stable/main/binary-hppa/cgiemail_1.6-14woody1_hppa.deb
cgiemail (1.6-14woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Filter nonprintable characters from parameters to prevent unauthorized use
    for transmitting email to arbitrary addresses (Closes: #222870)
    (CAN-2002-1575)


stable/main/binary-arm/cgiemail_1.6-14woody1_arm.deb
cgiemail (1.6-14woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Filter nonprintable characters from parameters to prevent unauthorized use
    for transmitting email to arbitrary addresses (Closes: #222870)
    (CAN-2002-1575)


stable/main/binary-alpha/cgiemail_1.6-14woody1_alpha.deb
cgiemail (1.6-14woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Filter nonprintable characters from parameters to prevent unauthorized use
    for transmitting email to arbitrary addresses (Closes: #222870)
    (CAN-2002-1575)


stable/main/source/cgiemail_1.6-14woody1.dsc
stable/main/source/cgiemail_1.6-14woody1.diff.gz
stable/main/binary-i386/cgiemail_1.6-14woody1_i386.deb
cgiemail (1.6-14woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Filter nonprintable characters from parameters to prevent unauthorized use
    for transmitting email to arbitrary addresses (Closes: #222870)
    (CAN-2002-1575)


stable/main/binary-sparc/cfs_1.4.1-7.1_sparc.deb
cfs (1.4.1-7.1) stable; urgency=low
  * upload to woody; cfs is not usable on s390 due to an internal
    compiler error (most probably), see bug #151564; needs to be rebuilt
    with gcc-2.95 from woody 3.0r1; no more changes than this changelog
    entry.


stable/main/binary-s390/cfs_1.4.1-7.1_s390.deb
cfs (1.4.1-7.1) stable; urgency=low
  * upload to woody; cfs is not usable on s390 due to an internal
    compiler error (most probably), see bug #151564; needs to be rebuilt
    with gcc-2.95 from woody 3.0r1; no more changes than this changelog
    entry.


stable/main/binary-powerpc/cfs_1.4.1-7.1_powerpc.deb
cfs (1.4.1-7.1) stable; urgency=low
  * upload to woody; cfs is not usable on s390 due to an internal
    compiler error (most probably), see bug #151564; needs to be rebuilt
    with gcc-2.95 from woody 3.0r1; no more changes than this changelog
    entry.


stable/main/binary-mipsel/cfs_1.4.1-7.1_mipsel.deb
cfs (1.4.1-7.1) stable; urgency=low
  * upload to woody; cfs is not usable on s390 due to an internal
    compiler error (most probably), see bug #151564; needs to be rebuilt
    with gcc-2.95 from woody 3.0r1; no more changes than this changelog
    entry.


stable/main/binary-mips/cfs_1.4.1-7.1_mips.deb
cfs (1.4.1-7.1) stable; urgency=low
  * upload to woody; cfs is not usable on s390 due to an internal
    compiler error (most probably), see bug #151564; needs to be rebuilt
    with gcc-2.95 from woody 3.0r1; no more changes than this changelog
    entry.


stable/main/binary-m68k/cfs_1.4.1-7.1_m68k.deb
cfs (1.4.1-7.1) stable; urgency=low
  * upload to woody; cfs is not usable on s390 due to an internal
    compiler error (most probably), see bug #151564; needs to be rebuilt
    with gcc-2.95 from woody 3.0r1; no more changes than this changelog
    entry.


stable/main/binary-ia64/cfs_1.4.1-7.1_ia64.deb
cfs (1.4.1-7.1) stable; urgency=low
  * upload to woody; cfs is not usable on s390 due to an internal
    compiler error (most probably), see bug #151564; needs to be rebuilt
    with gcc-2.95 from woody 3.0r1; no more changes than this changelog
    entry.


stable/main/binary-i386/cfs_1.4.1-7.1_i386.deb
cfs (1.4.1-7.1) stable; urgency=low
  * upload to woody; cfs is not usable on s390 due to an internal
    compiler error (most probably), see bug #151564; needs to be rebuilt
    with gcc-2.95 from woody 3.0r1; no more changes than this changelog
    entry.


stable/main/binary-hppa/cfs_1.4.1-7.1_hppa.deb
cfs (1.4.1-7.1) stable; urgency=low
  * upload to woody; cfs is not usable on s390 due to an internal
    compiler error (most probably), see bug #151564; needs to be rebuilt
    with gcc-2.95 from woody 3.0r1; no more changes than this changelog
    entry.


stable/main/binary-arm/cfs_1.4.1-7.1_arm.deb
cfs (1.4.1-7.1) stable; urgency=low
  * upload to woody; cfs is not usable on s390 due to an internal
    compiler error (most probably), see bug #151564; needs to be rebuilt
    with gcc-2.95 from woody 3.0r1; no more changes than this changelog
    entry.


stable/main/binary-alpha/cfs_1.4.1-7.1_alpha.deb
cfs (1.4.1-7.1) stable; urgency=low
  * upload to woody; cfs is not usable on s390 due to an internal
    compiler error (most probably), see bug #151564; needs to be rebuilt
    with gcc-2.95 from woody 3.0r1; no more changes than this changelog
    entry.


stable/main/source/cfs_1.4.1-7.1.dsc
stable/main/source/cfs_1.4.1-7.1.diff.gz
cfs (1.4.1-7.1) stable; urgency=low
  * upload to woody; cfs is not usable on s390 due to an internal
    compiler error (most probably), see bug #151564; needs to be rebuilt
    with gcc-2.95 from woody 3.0r1; no more changes than this changelog
    entry.


stable/main/binary-sparc/calife_2.8.4c-1woody1_sparc.deb
calife (2.8.4c-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from
    upstream 2.8.6
    Closes: #235157


stable/main/binary-s390/calife_2.8.4c-1woody1_s390.deb
calife (2.8.4c-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from
    upstream 2.8.6
    Closes: #235157


stable/main/binary-powerpc/calife_2.8.4c-1woody1_powerpc.deb
calife (2.8.4c-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from
    upstream 2.8.6
    Closes: #235157


stable/main/binary-mipsel/calife_2.8.4c-1woody1_mipsel.deb
calife (2.8.4c-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from
    upstream 2.8.6
    Closes: #235157


stable/main/binary-mips/calife_2.8.4c-1woody1_mips.deb
calife (2.8.4c-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from
    upstream 2.8.6
    Closes: #235157


stable/main/binary-m68k/calife_2.8.4c-1woody1_m68k.deb
calife (2.8.4c-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from
    upstream 2.8.6
    Closes: #235157


stable/main/binary-ia64/calife_2.8.4c-1woody1_ia64.deb
calife (2.8.4c-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from
    upstream 2.8.6
    Closes: #235157


stable/main/binary-hppa/calife_2.8.4c-1woody1_hppa.deb
calife (2.8.4c-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from
    upstream 2.8.6
    Closes: #235157


stable/main/binary-arm/calife_2.8.4c-1woody1_arm.deb
calife (2.8.4c-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from
    upstream 2.8.6
    Closes: #235157


stable/main/binary-alpha/calife_2.8.4c-1woody1_alpha.deb
calife (2.8.4c-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from
    upstream 2.8.6
    Closes: #235157


stable/main/source/calife_2.8.4c-1woody1.dsc
stable/main/source/calife_2.8.4c-1woody1.diff.gz
stable/main/binary-i386/calife_2.8.4c-1woody1_i386.deb
calife (2.8.4c-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix heap overflow via getpass(3) (CAN-2004-0188) using patch from
    upstream 2.8.6
    Closes: #235157


stable/main/binary-s390/bonsai_1.3+cvs20020224-1woody1_s390.deb
bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high
  * Fix security bug that allow remote execution of command as www-data user
    (see #142317 upstream bug).
  * Fix security bug that cause absolute path disclosure (see #187230 upstream
    bug).
  * Fix security bug that makes Bonsai vulnerable to cross-site scripting
    attacks (see #146244 and #163573 upstream bug).
  * Access to parameters page isn't any more allowed without password (see
    #45579 upstream bug)


stable/main/binary-powerpc/bonsai_1.3+cvs20020224-1woody1_powerpc.deb
bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high
  * Fix security bug that allow remote execution of command as www-data user
    (see #142317 upstream bug).
  * Fix security bug that cause absolute path disclosure (see #187230 upstream
    bug).
  * Fix security bug that makes Bonsai vulnerable to cross-site scripting
    attacks (see #146244 and #163573 upstream bug).
  * Access to parameters page isn't any more allowed without password (see
    #45579 upstream bug)


stable/main/binary-mipsel/bonsai_1.3+cvs20020224-1woody1_mipsel.deb
bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high
  * Fix security bug that allow remote execution of command as www-data user
    (see #142317 upstream bug).
  * Fix security bug that cause absolute path disclosure (see #187230 upstream
    bug).
  * Fix security bug that makes Bonsai vulnerable to cross-site scripting
    attacks (see #146244 and #163573 upstream bug).
  * Access to parameters page isn't any more allowed without password (see
    #45579 upstream bug)


stable/main/binary-mips/bonsai_1.3+cvs20020224-1woody1_mips.deb
bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high
  * Fix security bug that allow remote execution of command as www-data user
    (see #142317 upstream bug).
  * Fix security bug that cause absolute path disclosure (see #187230 upstream
    bug).
  * Fix security bug that makes Bonsai vulnerable to cross-site scripting
    attacks (see #146244 and #163573 upstream bug).
  * Access to parameters page isn't any more allowed without password (see
    #45579 upstream bug)


stable/main/binary-m68k/bonsai_1.3+cvs20020224-1woody1_m68k.deb
bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high
  * Fix security bug that allow remote execution of command as www-data user
    (see #142317 upstream bug).
  * Fix security bug that cause absolute path disclosure (see #187230 upstream
    bug).
  * Fix security bug that makes Bonsai vulnerable to cross-site scripting
    attacks (see #146244 and #163573 upstream bug).
  * Access to parameters page isn't any more allowed without password (see
    #45579 upstream bug)


stable/main/binary-ia64/bonsai_1.3+cvs20020224-1woody1_ia64.deb
bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high
  * Fix security bug that allow remote execution of command as www-data user
    (see #142317 upstream bug).
  * Fix security bug that cause absolute path disclosure (see #187230 upstream
    bug).
  * Fix security bug that makes Bonsai vulnerable to cross-site scripting
    attacks (see #146244 and #163573 upstream bug).
  * Access to parameters page isn't any more allowed without password (see
    #45579 upstream bug)


stable/main/binary-i386/bonsai_1.3+cvs20020224-1woody1_i386.deb
bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high
  * Fix security bug that allow remote execution of command as www-data user
    (see #142317 upstream bug).
  * Fix security bug that cause absolute path disclosure (see #187230 upstream
    bug).
  * Fix security bug that makes Bonsai vulnerable to cross-site scripting
    attacks (see #146244 and #163573 upstream bug).
  * Access to parameters page isn't any more allowed without password (see
    #45579 upstream bug)


stable/main/binary-hppa/bonsai_1.3+cvs20020224-1woody1_hppa.deb
bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high
  * Fix security bug that allow remote execution of command as www-data user
    (see #142317 upstream bug).
  * Fix security bug that cause absolute path disclosure (see #187230 upstream
    bug).
  * Fix security bug that makes Bonsai vulnerable to cross-site scripting
    attacks (see #146244 and #163573 upstream bug).
  * Access to parameters page isn't any more allowed without password (see
    #45579 upstream bug)


stable/main/binary-arm/bonsai_1.3+cvs20020224-1woody1_arm.deb
bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high
  * Fix security bug that allow remote execution of command as www-data user
    (see #142317 upstream bug).
  * Fix security bug that cause absolute path disclosure (see #187230 upstream
    bug).
  * Fix security bug that makes Bonsai vulnerable to cross-site scripting
    attacks (see #146244 and #163573 upstream bug).
  * Access to parameters page isn't any more allowed without password (see
    #45579 upstream bug)


stable/main/binary-alpha/bonsai_1.3+cvs20020224-1woody1_alpha.deb
bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high
  * Fix security bug that allow remote execution of command as www-data user
    (see #142317 upstream bug).
  * Fix security bug that cause absolute path disclosure (see #187230 upstream
    bug).
  * Fix security bug that makes Bonsai vulnerable to cross-site scripting
    attacks (see #146244 and #163573 upstream bug).
  * Access to parameters page isn't any more allowed without password (see
    #45579 upstream bug)


stable/main/binary-sparc/bonsai_1.3+cvs20020224-1woody1_sparc.deb
stable/main/source/bonsai_1.3+cvs20020224-1woody1.dsc
stable/main/source/bonsai_1.3+cvs20020224-1woody1.diff.gz
bonsai (1.3+cvs20020224-1woody1) stable-security; urgency=high
  * Fix security bug that allow remote execution of command as www-data user
    (see #142317 upstream bug).
  * Fix security bug that cause absolute path disclosure (see #187230 upstream
    bug).
  * Fix security bug that makes Bonsai vulnerable to cross-site scripting
    attacks (see #146244 and #163573 upstream bug).
  * Access to parameters page isn't any more allowed without password (see
    #45579 upstream bug)


stable/main/binary-sparc/liblwres1_9.2.1-2.woody.2_sparc.deb
stable/main/binary-sparc/bind9_9.2.1-2.woody.2_sparc.deb
stable/main/binary-sparc/libdns5_9.2.1-2.woody.2_sparc.deb
stable/main/binary-sparc/libisccc0_9.2.1-2.woody.2_sparc.deb
stable/main/binary-sparc/lwresd_9.2.1-2.woody.2_sparc.deb
stable/main/binary-sparc/libisccfg0_9.2.1-2.woody.2_sparc.deb
stable/main/binary-sparc/libisc4_9.2.1-2.woody.2_sparc.deb
stable/main/binary-sparc/dnsutils_9.2.1-2.woody.2_sparc.deb
stable/main/binary-sparc/libbind-dev_9.2.1-2.woody.2_sparc.deb
stable/main/binary-sparc/bind9-host_9.2.1-2.woody.2_sparc.deb
bind9 (1:9.2.1-2.woody.2) stable; urgency=low
  * No change upload to clean up parser errors....  Closes: #179311


stable/main/binary-s390/bind9_9.2.1-2.woody.2_s390.deb
stable/main/binary-s390/libdns5_9.2.1-2.woody.2_s390.deb
stable/main/binary-s390/liblwres1_9.2.1-2.woody.2_s390.deb
stable/main/binary-s390/bind9-host_9.2.1-2.woody.2_s390.deb
stable/main/binary-s390/dnsutils_9.2.1-2.woody.2_s390.deb
stable/main/binary-s390/lwresd_9.2.1-2.woody.2_s390.deb
stable/main/binary-s390/libbind-dev_9.2.1-2.woody.2_s390.deb
stable/main/binary-s390/libisc4_9.2.1-2.woody.2_s390.deb
stable/main/binary-s390/libisccc0_9.2.1-2.woody.2_s390.deb
stable/main/binary-s390/libisccfg0_9.2.1-2.woody.2_s390.deb
bind9 (1:9.2.1-2.woody.2) stable; urgency=low
  * No change upload to clean up parser errors....  Closes: #179311


stable/main/binary-powerpc/libisccfg0_9.2.1-2.woody.2_powerpc.deb
stable/main/binary-powerpc/libisccc0_9.2.1-2.woody.2_powerpc.deb
stable/main/binary-powerpc/libbind-dev_9.2.1-2.woody.2_powerpc.deb
stable/main/binary-powerpc/libdns5_9.2.1-2.woody.2_powerpc.deb
stable/main/binary-powerpc/bind9_9.2.1-2.woody.2_powerpc.deb
stable/main/binary-powerpc/libisc4_9.2.1-2.woody.2_powerpc.deb
stable/main/binary-powerpc/bind9-host_9.2.1-2.woody.2_powerpc.deb
stable/main/binary-powerpc/dnsutils_9.2.1-2.woody.2_powerpc.deb
stable/main/binary-powerpc/liblwres1_9.2.1-2.woody.2_powerpc.deb
stable/main/binary-powerpc/lwresd_9.2.1-2.woody.2_powerpc.deb
bind9 (1:9.2.1-2.woody.2) stable; urgency=low
  * No change upload to clean up parser errors....  Closes: #179311


stable/main/binary-mipsel/libdns5_9.2.1-2.woody.2_mipsel.deb
stable/main/binary-mipsel/liblwres1_9.2.1-2.woody.2_mipsel.deb
stable/main/binary-mipsel/libisc4_9.2.1-2.woody.2_mipsel.deb
stable/main/binary-mipsel/bind9_9.2.1-2.woody.2_mipsel.deb
stable/main/binary-mipsel/libbind-dev_9.2.1-2.woody.2_mipsel.deb
stable/main/binary-mipsel/dnsutils_9.2.1-2.woody.2_mipsel.deb
stable/main/binary-mipsel/lwresd_9.2.1-2.woody.2_mipsel.deb
stable/main/binary-mipsel/bind9-host_9.2.1-2.woody.2_mipsel.deb
stable/main/binary-mipsel/libisccfg0_9.2.1-2.woody.2_mipsel.deb
stable/main/binary-mipsel/libisccc0_9.2.1-2.woody.2_mipsel.deb
bind9 (1:9.2.1-2.woody.2) stable; urgency=low
  * No change upload to clean up parser errors....  Closes: #179311


stable/main/binary-mips/bind9-host_9.2.1-2.woody.2_mips.deb
stable/main/binary-mips/libisc4_9.2.1-2.woody.2_mips.deb
stable/main/binary-mips/bind9_9.2.1-2.woody.2_mips.deb
stable/main/binary-mips/libdns5_9.2.1-2.woody.2_mips.deb
stable/main/binary-mips/libbind-dev_9.2.1-2.woody.2_mips.deb
stable/main/binary-mips/lwresd_9.2.1-2.woody.2_mips.deb
stable/main/binary-mips/liblwres1_9.2.1-2.woody.2_mips.deb
stable/main/binary-mips/dnsutils_9.2.1-2.woody.2_mips.deb
stable/main/binary-mips/libisccc0_9.2.1-2.woody.2_mips.deb
stable/main/binary-mips/libisccfg0_9.2.1-2.woody.2_mips.deb
bind9 (1:9.2.1-2.woody.2) stable; urgency=low
  * No change upload to clean up parser errors....  Closes: #179311


stable/main/binary-m68k/libdns5_9.2.1-2.woody.2_m68k.deb
stable/main/binary-m68k/liblwres1_9.2.1-2.woody.2_m68k.deb
stable/main/binary-m68k/libisccc0_9.2.1-2.woody.2_m68k.deb
stable/main/binary-m68k/dnsutils_9.2.1-2.woody.2_m68k.deb
stable/main/binary-m68k/libbind-dev_9.2.1-2.woody.2_m68k.deb
stable/main/binary-m68k/bind9_9.2.1-2.woody.2_m68k.deb
stable/main/binary-m68k/libisc4_9.2.1-2.woody.2_m68k.deb
stable/main/binary-m68k/lwresd_9.2.1-2.woody.2_m68k.deb
stable/main/binary-m68k/bind9-host_9.2.1-2.woody.2_m68k.deb
stable/main/binary-m68k/libisccfg0_9.2.1-2.woody.2_m68k.deb
bind9 (1:9.2.1-2.woody.2) stable; urgency=low
  * No change upload to clean up parser errors....  Closes: #179311


stable/main/binary-ia64/libbind-dev_9.2.1-2.woody.2_ia64.deb
stable/main/binary-ia64/libdns5_9.2.1-2.woody.2_ia64.deb
stable/main/binary-ia64/libisc4_9.2.1-2.woody.2_ia64.deb
stable/main/binary-ia64/lwresd_9.2.1-2.woody.2_ia64.deb
stable/main/binary-ia64/dnsutils_9.2.1-2.woody.2_ia64.deb
stable/main/binary-ia64/bind9-host_9.2.1-2.woody.2_ia64.deb
stable/main/binary-ia64/libisccfg0_9.2.1-2.woody.2_ia64.deb
stable/main/binary-ia64/libisccc0_9.2.1-2.woody.2_ia64.deb
stable/main/binary-ia64/bind9_9.2.1-2.woody.2_ia64.deb
stable/main/binary-ia64/liblwres1_9.2.1-2.woody.2_ia64.deb
bind9 (1:9.2.1-2.woody.2) stable; urgency=low
  * No change upload to clean up parser errors....  Closes: #179311


stable/main/binary-hppa/libisc4_9.2.1-2.woody.2_hppa.deb
stable/main/binary-hppa/liblwres1_9.2.1-2.woody.2_hppa.deb
stable/main/binary-hppa/libbind-dev_9.2.1-2.woody.2_hppa.deb
stable/main/binary-hppa/libisccc0_9.2.1-2.woody.2_hppa.deb
stable/main/binary-hppa/libisccfg0_9.2.1-2.woody.2_hppa.deb
stable/main/binary-hppa/bind9_9.2.1-2.woody.2_hppa.deb
stable/main/binary-hppa/libdns5_9.2.1-2.woody.2_hppa.deb
stable/main/binary-hppa/dnsutils_9.2.1-2.woody.2_hppa.deb
stable/main/binary-hppa/lwresd_9.2.1-2.woody.2_hppa.deb
stable/main/binary-hppa/bind9-host_9.2.1-2.woody.2_hppa.deb
bind9 (1:9.2.1-2.woody.2) stable; urgency=low
  * No change upload to clean up parser errors....  Closes: #179311


stable/main/binary-arm/bind9-host_9.2.1-2.woody.2_arm.deb
stable/main/binary-arm/libbind-dev_9.2.1-2.woody.2_arm.deb
stable/main/binary-arm/libdns5_9.2.1-2.woody.2_arm.deb
stable/main/binary-arm/libisc4_9.2.1-2.woody.2_arm.deb
stable/main/binary-arm/libisccfg0_9.2.1-2.woody.2_arm.deb
stable/main/binary-arm/bind9_9.2.1-2.woody.2_arm.deb
stable/main/binary-arm/liblwres1_9.2.1-2.woody.2_arm.deb
stable/main/binary-arm/libisccc0_9.2.1-2.woody.2_arm.deb
stable/main/binary-arm/lwresd_9.2.1-2.woody.2_arm.deb
stable/main/binary-arm/dnsutils_9.2.1-2.woody.2_arm.deb
bind9 (1:9.2.1-2.woody.2) stable; urgency=low
  * No change upload to clean up parser errors....  Closes: #179311


stable/main/binary-alpha/bind9_9.2.1-2.woody.2_alpha.deb
stable/main/binary-alpha/bind9-host_9.2.1-2.woody.2_alpha.deb
stable/main/binary-alpha/liblwres1_9.2.1-2.woody.2_alpha.deb
stable/main/binary-alpha/lwresd_9.2.1-2.woody.2_alpha.deb
stable/main/binary-alpha/libisc4_9.2.1-2.woody.2_alpha.deb
stable/main/binary-alpha/libisccfg0_9.2.1-2.woody.2_alpha.deb
stable/main/binary-alpha/libisccc0_9.2.1-2.woody.2_alpha.deb
stable/main/binary-alpha/libdns5_9.2.1-2.woody.2_alpha.deb
stable/main/binary-alpha/libbind-dev_9.2.1-2.woody.2_alpha.deb
stable/main/binary-alpha/dnsutils_9.2.1-2.woody.2_alpha.deb
bind9 (1:9.2.1-2.woody.2) stable; urgency=low
  * No change upload to clean up parser errors....  Closes: #179311


stable/main/binary-i386/bind9_9.2.1-2.woody.2_i386.deb
stable/main/source/bind9_9.2.1-2.woody.2.dsc
stable/main/binary-i386/libisccfg0_9.2.1-2.woody.2_i386.deb
stable/main/binary-i386/libisccc0_9.2.1-2.woody.2_i386.deb
stable/main/binary-i386/dnsutils_9.2.1-2.woody.2_i386.deb
stable/main/binary-i386/liblwres1_9.2.1-2.woody.2_i386.deb
stable/main/binary-i386/libisc4_9.2.1-2.woody.2_i386.deb
stable/main/binary-all/bind9-doc_9.2.1-2.woody.2_all.deb
stable/main/source/bind9_9.2.1-2.woody.2.diff.gz
stable/main/binary-i386/bind9-host_9.2.1-2.woody.2_i386.deb
stable/main/binary-i386/libbind-dev_9.2.1-2.woody.2_i386.deb
stable/main/binary-i386/libdns5_9.2.1-2.woody.2_i386.deb
stable/main/binary-i386/lwresd_9.2.1-2.woody.2_i386.deb
bind9 (1:9.2.1-2.woody.2) stable; urgency=low
  * No change upload to clean up parser errors....  Closes: #179311


stable/main/binary-sparc/bind_8.3.3-2.0woody2_sparc.deb
stable/main/binary-sparc/bind-dev_8.3.3-2.0woody2_sparc.deb
bind (1:8.3.3-2.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix cache poisoning vulnerability (CAN-2003-0914)
    [src/bin/named/ns_resp.c]


stable/main/binary-s390/bind_8.3.3-2.0woody2_s390.deb
stable/main/binary-s390/bind-dev_8.3.3-2.0woody2_s390.deb
bind (1:8.3.3-2.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix cache poisoning vulnerability (CAN-2003-0914)
    [src/bin/named/ns_resp.c]


stable/main/binary-powerpc/bind_8.3.3-2.0woody2_powerpc.deb
stable/main/binary-powerpc/bind-dev_8.3.3-2.0woody2_powerpc.deb
bind (1:8.3.3-2.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix cache poisoning vulnerability (CAN-2003-0914)
    [src/bin/named/ns_resp.c]


stable/main/binary-mipsel/bind_8.3.3-2.0woody2_mipsel.deb
stable/main/binary-mipsel/bind-dev_8.3.3-2.0woody2_mipsel.deb
bind (1:8.3.3-2.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix cache poisoning vulnerability (CAN-2003-0914)
    [src/bin/named/ns_resp.c]


stable/main/binary-mips/bind_8.3.3-2.0woody2_mips.deb
stable/main/binary-mips/bind-dev_8.3.3-2.0woody2_mips.deb
bind (1:8.3.3-2.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix cache poisoning vulnerability (CAN-2003-0914)
    [src/bin/named/ns_resp.c]


stable/main/binary-m68k/bind-dev_8.3.3-2.0woody2_m68k.deb
stable/main/binary-m68k/bind_8.3.3-2.0woody2_m68k.deb
bind (1:8.3.3-2.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix cache poisoning vulnerability (CAN-2003-0914)
    [src/bin/named/ns_resp.c]


stable/main/binary-ia64/bind_8.3.3-2.0woody2_ia64.deb
stable/main/binary-ia64/bind-dev_8.3.3-2.0woody2_ia64.deb
bind (1:8.3.3-2.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix cache poisoning vulnerability (CAN-2003-0914)
    [src/bin/named/ns_resp.c]


stable/main/binary-hppa/bind_8.3.3-2.0woody2_hppa.deb
stable/main/binary-hppa/bind-dev_8.3.3-2.0woody2_hppa.deb
bind (1:8.3.3-2.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix cache poisoning vulnerability (CAN-2003-0914)
    [src/bin/named/ns_resp.c]


stable/main/binary-arm/bind-dev_8.3.3-2.0woody2_arm.deb
stable/main/binary-arm/bind_8.3.3-2.0woody2_arm.deb
bind (1:8.3.3-2.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix cache poisoning vulnerability (CAN-2003-0914)
    [src/bin/named/ns_resp.c]


stable/main/binary-alpha/bind-dev_8.3.3-2.0woody2_alpha.deb
stable/main/binary-alpha/bind_8.3.3-2.0woody2_alpha.deb
bind (1:8.3.3-2.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix cache poisoning vulnerability (CAN-2003-0914)
    [src/bin/named/ns_resp.c]


stable/main/binary-i386/bind-dev_8.3.3-2.0woody2_i386.deb
stable/main/source/bind_8.3.3-2.0woody2.diff.gz
stable/main/binary-i386/bind_8.3.3-2.0woody2_i386.deb
stable/main/binary-all/bind-doc_8.3.3-2.0woody2_all.deb
stable/main/source/bind_8.3.3-2.0woody2.dsc
bind (1:8.3.3-2.0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix cache poisoning vulnerability (CAN-2003-0914)
    [src/bin/named/ns_resp.c]


stable/contrib/binary-sparc/atari800_1.2.2-1woody2_sparc.deb
atari800 (1.2.2-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update src/config.{guess,sub} to fix build on mipsel


stable/contrib/binary-s390/atari800_1.2.2-1woody2_s390.deb
atari800 (1.2.2-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update src/config.{guess,sub} to fix build on mipsel


stable/contrib/binary-powerpc/atari800_1.2.2-1woody2_powerpc.deb
atari800 (1.2.2-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update src/config.{guess,sub} to fix build on mipsel


stable/contrib/binary-mips/atari800_1.2.2-1woody2_mips.deb
atari800 (1.2.2-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update src/config.{guess,sub} to fix build on mipsel


stable/contrib/binary-m68k/atari800_1.2.2-1woody2_m68k.deb
atari800 (1.2.2-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update src/config.{guess,sub} to fix build on mipsel


stable/contrib/binary-ia64/atari800_1.2.2-1woody2_ia64.deb
atari800 (1.2.2-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update src/config.{guess,sub} to fix build on mipsel


stable/contrib/binary-hppa/atari800_1.2.2-1woody2_hppa.deb
atari800 (1.2.2-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update src/config.{guess,sub} to fix build on mipsel


stable/contrib/binary-arm/atari800_1.2.2-1woody2_arm.deb
atari800 (1.2.2-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update src/config.{guess,sub} to fix build on mipsel


stable/contrib/binary-alpha/atari800_1.2.2-1woody2_alpha.deb
atari800 (1.2.2-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update src/config.{guess,sub} to fix build on mipsel


stable/contrib/source/atari800_1.2.2-1woody2.dsc
stable/contrib/binary-i386/atari800_1.2.2-1woody2_i386.deb
stable/contrib/source/atari800_1.2.2-1woody2.diff.gz
atari800 (1.2.2-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update src/config.{guess,sub} to fix build on mipsel


stable/main/binary-sparc/aspell_0.33.7.1.1-9_sparc.deb
stable/main/binary-sparc/aspell-en_0.33.7.1.1-9_sparc.deb
stable/main/binary-sparc/libaspell10_0.33.7.1.1-9_sparc.deb
stable/main/binary-sparc/libaspell-dev_0.33.7.1.1-9_sparc.deb
aspell (0.33.7.1.1-9) stable; urgency=low
  * Repackaged upstream source tarball with a newer version of SCOWL, the
    wordlists making up aspell-en, that has the questionably licensed
    wordlists removed.  The aspell source package is now unquestionably
    100% DFSG-compliant.
  * Gave aspell-en its own copyright file.  It's not LGPL but rather the
    SCOWL conglomerate license.


stable/main/binary-s390/libaspell10_0.33.7.1.1-9_s390.deb
stable/main/binary-s390/aspell_0.33.7.1.1-9_s390.deb
stable/main/binary-s390/aspell-en_0.33.7.1.1-9_s390.deb
stable/main/binary-s390/libaspell-dev_0.33.7.1.1-9_s390.deb
aspell (0.33.7.1.1-9) stable; urgency=low
  * Repackaged upstream source tarball with a newer version of SCOWL, the
    wordlists making up aspell-en, that has the questionably licensed
    wordlists removed.  The aspell source package is now unquestionably
    100% DFSG-compliant.
  * Gave aspell-en its own copyright file.  It's not LGPL but rather the
    SCOWL conglomerate license.


stable/main/binary-powerpc/libaspell10_0.33.7.1.1-9_powerpc.deb
stable/main/binary-powerpc/aspell_0.33.7.1.1-9_powerpc.deb
stable/main/binary-powerpc/aspell-en_0.33.7.1.1-9_powerpc.deb
stable/main/binary-powerpc/libaspell-dev_0.33.7.1.1-9_powerpc.deb
aspell (0.33.7.1.1-9) stable; urgency=low
  * Repackaged upstream source tarball with a newer version of SCOWL, the
    wordlists making up aspell-en, that has the questionably licensed
    wordlists removed.  The aspell source package is now unquestionably
    100% DFSG-compliant.
  * Gave aspell-en its own copyright file.  It's not LGPL but rather the
    SCOWL conglomerate license.


stable/main/binary-m68k/aspell_0.33.7.1.1-9_m68k.deb
stable/main/binary-m68k/libaspell10_0.33.7.1.1-9_m68k.deb
stable/main/binary-m68k/libaspell-dev_0.33.7.1.1-9_m68k.deb
stable/main/binary-m68k/aspell-en_0.33.7.1.1-9_m68k.deb
aspell (0.33.7.1.1-9) stable; urgency=low
  * Repackaged upstream source tarball with a newer version of SCOWL, the
    wordlists making up aspell-en, that has the questionably licensed
    wordlists removed.  The aspell source package is now unquestionably
    100% DFSG-compliant.
  * Gave aspell-en its own copyright file.  It's not LGPL but rather the
    SCOWL conglomerate license.


stable/main/binary-ia64/libaspell10_0.33.7.1.1-9_ia64.deb
stable/main/binary-ia64/libaspell-dev_0.33.7.1.1-9_ia64.deb
stable/main/binary-ia64/aspell_0.33.7.1.1-9_ia64.deb
stable/main/binary-ia64/aspell-en_0.33.7.1.1-9_ia64.deb
aspell (0.33.7.1.1-9) stable; urgency=low
  * Repackaged upstream source tarball with a newer version of SCOWL, the
    wordlists making up aspell-en, that has the questionably licensed
    wordlists removed.  The aspell source package is now unquestionably
    100% DFSG-compliant.
  * Gave aspell-en its own copyright file.  It's not LGPL but rather the
    SCOWL conglomerate license.


stable/main/binary-arm/aspell-en_0.33.7.1.1-9_arm.deb
stable/main/binary-arm/aspell_0.33.7.1.1-9_arm.deb
stable/main/binary-arm/libaspell10_0.33.7.1.1-9_arm.deb
stable/main/binary-arm/libaspell-dev_0.33.7.1.1-9_arm.deb
aspell (0.33.7.1.1-9) stable; urgency=low
  * Repackaged upstream source tarball with a newer version of SCOWL, the
    wordlists making up aspell-en, that has the questionably licensed
    wordlists removed.  The aspell source package is now unquestionably
    100% DFSG-compliant.
  * Gave aspell-en its own copyright file.  It's not LGPL but rather the
    SCOWL conglomerate license.


stable/main/binary-alpha/aspell-en_0.33.7.1.1-9_alpha.deb
stable/main/binary-alpha/libaspell10_0.33.7.1.1-9_alpha.deb
stable/main/binary-alpha/libaspell-dev_0.33.7.1.1-9_alpha.deb
stable/main/binary-alpha/aspell_0.33.7.1.1-9_alpha.deb
aspell (0.33.7.1.1-9) stable; urgency=low
  * Repackaged upstream source tarball with a newer version of SCOWL, the
    wordlists making up aspell-en, that has the questionably licensed
    wordlists removed.  The aspell source package is now unquestionably
    100% DFSG-compliant.
  * Gave aspell-en its own copyright file.  It's not LGPL but rather the
    SCOWL conglomerate license.


stable/main/binary-i386/aspell-en_0.33.7.1.1-9_i386.deb
stable/main/source/aspell_0.33.7.1.1-9.dsc
stable/main/source/aspell_0.33.7.1.1.orig.tar.gz
stable/main/binary-i386/libaspell10_0.33.7.1.1-9_i386.deb
stable/main/binary-i386/libaspell-dev_0.33.7.1.1-9_i386.deb
stable/main/binary-all/aspell-doc_0.33.7.1.1-9_all.deb
stable/main/source/aspell_0.33.7.1.1-9.diff.gz
stable/main/binary-i386/aspell_0.33.7.1.1-9_i386.deb
aspell (0.33.7.1.1-9) stable; urgency=low
  * Repackaged upstream source tarball with a newer version of SCOWL, the
    wordlists making up aspell-en, that has the questionably licensed
    wordlists removed.  The aspell source package is now unquestionably
    100% DFSG-compliant.
  * Gave aspell-en its own copyright file.  It's not LGPL but rather the
    SCOWL conglomerate license.


stable/main/binary-sparc/aptitude_0.2.11.1-4_sparc.deb
aptitude (0.2.11.1-4) stable; urgency=low
  * Rebuild for stable-proposed-updates...should have done this a couple
    years ago, but better late than never.  This upgrade is needed to
    cleanly upgrade from Woody to Sarge.  See bug #151701 for details.


stable/main/binary-s390/aptitude_0.2.11.1-4_s390.deb
aptitude (0.2.11.1-4) stable; urgency=low
  * Rebuild for stable-proposed-updates...should have done this a couple
    years ago, but better late than never.  This upgrade is needed to
    cleanly upgrade from Woody to Sarge.  See bug #151701 for details.


stable/main/binary-powerpc/aptitude_0.2.11.1-4_powerpc.deb
aptitude (0.2.11.1-4) stable; urgency=low
  * Rebuild for stable-proposed-updates...should have done this a couple
    years ago, but better late than never.  This upgrade is needed to
    cleanly upgrade from Woody to Sarge.  See bug #151701 for details.


stable/main/binary-m68k/aptitude_0.2.11.1-4_m68k.deb
aptitude (0.2.11.1-4) stable; urgency=low
  * Rebuild for stable-proposed-updates...should have done this a couple
    years ago, but better late than never.  This upgrade is needed to
    cleanly upgrade from Woody to Sarge.  See bug #151701 for details.


stable/main/binary-ia64/aptitude_0.2.11.1-4_ia64.deb
aptitude (0.2.11.1-4) stable; urgency=low
  * Rebuild for stable-proposed-updates...should have done this a couple
    years ago, but better late than never.  This upgrade is needed to
    cleanly upgrade from Woody to Sarge.  See bug #151701 for details.


stable/main/binary-hppa/aptitude_0.2.11.1-4_hppa.deb
aptitude (0.2.11.1-4) stable; urgency=low
  * Rebuild for stable-proposed-updates...should have done this a couple
    years ago, but better late than never.  This upgrade is needed to
    cleanly upgrade from Woody to Sarge.  See bug #151701 for details.


stable/main/binary-arm/aptitude_0.2.11.1-4_arm.deb
aptitude (0.2.11.1-4) stable; urgency=low
  * Rebuild for stable-proposed-updates...should have done this a couple
    years ago, but better late than never.  This upgrade is needed to
    cleanly upgrade from Woody to Sarge.  See bug #151701 for details.


stable/main/binary-alpha/aptitude_0.2.11.1-4_alpha.deb
aptitude (0.2.11.1-4) stable; urgency=low
  * Rebuild for stable-proposed-updates...should have done this a couple
    years ago, but better late than never.  This upgrade is needed to
    cleanly upgrade from Woody to Sarge.  See bug #151701 for details.


stable/main/source/aptitude_0.2.11.1-4.diff.gz
stable/main/binary-i386/aptitude_0.2.11.1-4_i386.deb
stable/main/source/aptitude_0.2.11.1-4.dsc
aptitude (0.2.11.1-4) stable; urgency=low
  * Rebuild for stable-proposed-updates...should have done this a couple
    years ago, but better late than never.  This upgrade is needed to
    cleanly upgrade from Woody to Sarge.  See bug #151701 for details.


stable/main/binary-sparc/apache_1.3.26-0woody5_sparc.deb
stable/main/binary-sparc/apache-dev_1.3.26-0woody5_sparc.deb
stable/main/binary-sparc/apache-common_1.3.26-0woody5_sparc.deb
apache (1.3.26-0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number to pass a version which was accepted but not
    installed


stable/main/binary-s390/apache-dev_1.3.26-0woody5_s390.deb
stable/main/binary-s390/apache-common_1.3.26-0woody5_s390.deb
stable/main/binary-s390/apache_1.3.26-0woody5_s390.deb
apache (1.3.26-0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number to pass a version which was accepted but not
    installed


stable/main/binary-powerpc/apache-common_1.3.26-0woody5_powerpc.deb
stable/main/binary-powerpc/apache_1.3.26-0woody5_powerpc.deb
stable/main/binary-powerpc/apache-dev_1.3.26-0woody5_powerpc.deb
apache (1.3.26-0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number to pass a version which was accepted but not
    installed


stable/main/binary-mipsel/apache_1.3.26-0woody5_mipsel.deb
stable/main/binary-mipsel/apache-dev_1.3.26-0woody5_mipsel.deb
stable/main/binary-mipsel/apache-common_1.3.26-0woody5_mipsel.deb
apache (1.3.26-0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number to pass a version which was accepted but not
    installed


stable/main/binary-mips/apache-common_1.3.26-0woody5_mips.deb
stable/main/binary-mips/apache-dev_1.3.26-0woody5_mips.deb
stable/main/binary-mips/apache_1.3.26-0woody5_mips.deb
apache (1.3.26-0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number to pass a version which was accepted but not
    installed


stable/main/binary-m68k/apache-common_1.3.26-0woody5_m68k.deb
stable/main/binary-m68k/apache_1.3.26-0woody5_m68k.deb
stable/main/binary-m68k/apache-dev_1.3.26-0woody5_m68k.deb
apache (1.3.26-0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number to pass a version which was accepted but not
    installed


stable/main/binary-ia64/apache-common_1.3.26-0woody5_ia64.deb
stable/main/binary-ia64/apache-dev_1.3.26-0woody5_ia64.deb
stable/main/binary-ia64/apache_1.3.26-0woody5_ia64.deb
apache (1.3.26-0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number to pass a version which was accepted but not
    installed


stable/main/binary-hppa/apache-common_1.3.26-0woody5_hppa.deb
stable/main/binary-hppa/apache_1.3.26-0woody5_hppa.deb
stable/main/binary-hppa/apache-dev_1.3.26-0woody5_hppa.deb
apache (1.3.26-0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number to pass a version which was accepted but not
    installed


stable/main/binary-arm/apache-dev_1.3.26-0woody5_arm.deb
stable/main/binary-arm/apache_1.3.26-0woody5_arm.deb
stable/main/binary-arm/apache-common_1.3.26-0woody5_arm.deb
apache (1.3.26-0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number to pass a version which was accepted but not
    installed


stable/main/binary-alpha/apache-common_1.3.26-0woody5_alpha.deb
stable/main/binary-alpha/apache-dev_1.3.26-0woody5_alpha.deb
stable/main/binary-alpha/apache_1.3.26-0woody5_alpha.deb
apache (1.3.26-0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number to pass a version which was accepted but not
    installed


stable/main/binary-i386/apache_1.3.26-0woody5_i386.deb
stable/main/source/apache_1.3.26-0woody5.dsc
stable/main/binary-i386/apache-common_1.3.26-0woody5_i386.deb
stable/main/binary-all/apache-doc_1.3.26-0woody5_all.deb
stable/main/source/apache_1.3.26-0woody5.diff.gz
stable/main/binary-i386/apache-dev_1.3.26-0woody5_i386.deb
apache (1.3.26-0woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Increment version number to pass a version which was accepted but not
    installed


========================================= 
Thu,  20 Nov 2003 - Debian 3.0r2 released
=========================================

Removed the following packages from stable:

       aspell | 0.33.7.1-8 | source, alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc
   aspell-doc | 0.33.7.1-8 | all
    aspell-en | 0.33.7.1-8 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc
libaspell-dev | 0.33.7.1-8 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc
  libaspell10 | 0.33.7.1-8 | alpha, arm, hppa, i386, ia64, m68k, powerpc, s390, sparc

 (Reason: as requested by Stable Release Manager)
   "The license incorrectly says that it's LGPL but it is in fact
    a unique license which is non-DFSG-free."

--

             cyrus-sasl2 |    2.1.2-2 | source
                libsasl2 |    2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc
            libsasl2-dev |    2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc
libsasl2-digestmd5-plain |    2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc
  libsasl2-modules-plain |    2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc
               sasl2-bin |    2.1.2-2 | alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc

 (Reason: as requested by Stable Release Manager)
   "The library has some minor security problems and according to
    the maintainer some other problems as well, i.e. it could not
    work with software in testing/unstable which requires it
    either.  All of the SASL-using software in stable uses
    cyrus-sasl, not cyrus-sasl2."

--

      micq | 0.4.9-0woody2 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390, sparc

 (Reason: as requested by Stable Release Manager)
   "The library has some minor security problems and according to
    Any version: Serious copyright violation, hence, removing.
    It's been removed from unstable and testing already. See
    Bug#167606 and Bug#194784"

--

     mindi |  0.58.r5-1 | alpha, arm, hppa, ia64, m68k, mips, mipsel, powerpc, s390, sparc

 (Reason: as requested by Stable Release Manager)
   "mindi is i386-centric since it uses lilo.  It was only
    accidently set to arch=any"

--

rocks-n-diamonds |  2.0.0-0.2 | source, alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, s390, sparc
rocks-n-diamonds | 2.0.0-0.2.1 | powerpc

 (Reason: as requested by Stable Release Manager)
   "Rocks-N-Diamonds contains sound, graphics and level data which
    violate section 2.3 of the Debian policy manual.  Some of the
    game content originates with commercial sources that have not
    provided explicit permission for their reuse."
      

--

python-tmda |     0.51-1 | all
       tmda |     0.51-1 | source, all

 (Reason: as requested by Stable Release Manager)
   "Bug#219361: please remove tmda from stable"

--

zblast-svgalib |   1.2pre-5 | alpha

 (Reason: as requested by Stable Release Manager)
   "The alpha build failed completely because svgalib doesn't
    exist on alpha anymore in woody (i.e., its build-depends could
    not even be met), so I had to disable it.  Hence, the alpha
    package needs to be removed."

------

	
stable/main/binary-sparc/libssl0.9.6_0.9.6c-2.woody.4_sparc.deb
stable/main/binary-sparc/libssl-dev_0.9.6c-2.woody.4_sparc.deb
stable/main/binary-sparc/openssl_0.9.6c-2.woody.4_sparc.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/binary-s390/libssl0.9.6_0.9.6c-2.woody.4_s390.deb
stable/main/binary-s390/openssl_0.9.6c-2.woody.4_s390.deb
stable/main/binary-s390/libssl-dev_0.9.6c-2.woody.4_s390.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/binary-powerpc/libssl-dev_0.9.6c-2.woody.4_powerpc.deb
stable/main/binary-powerpc/libssl0.9.6_0.9.6c-2.woody.4_powerpc.deb
stable/main/binary-powerpc/openssl_0.9.6c-2.woody.4_powerpc.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/binary-mipsel/openssl_0.9.6c-2.woody.4_mipsel.deb
stable/main/binary-mipsel/libssl-dev_0.9.6c-2.woody.4_mipsel.deb
stable/main/binary-mipsel/libssl0.9.6_0.9.6c-2.woody.4_mipsel.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/binary-mips/libssl-dev_0.9.6c-2.woody.4_mips.deb
stable/main/binary-mips/openssl_0.9.6c-2.woody.4_mips.deb
stable/main/binary-mips/libssl0.9.6_0.9.6c-2.woody.4_mips.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/binary-m68k/libssl-dev_0.9.6c-2.woody.4_m68k.deb
stable/main/binary-m68k/libssl0.9.6_0.9.6c-2.woody.4_m68k.deb
stable/main/binary-m68k/openssl_0.9.6c-2.woody.4_m68k.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/binary-ia64/openssl_0.9.6c-2.woody.4_ia64.deb
stable/main/binary-ia64/libssl0.9.6_0.9.6c-2.woody.4_ia64.deb
stable/main/binary-ia64/libssl-dev_0.9.6c-2.woody.4_ia64.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/binary-hppa/libssl-dev_0.9.6c-2.woody.4_hppa.deb
stable/main/binary-hppa/libssl0.9.6_0.9.6c-2.woody.4_hppa.deb
stable/main/binary-hppa/openssl_0.9.6c-2.woody.4_hppa.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/binary-arm/libssl0.9.6_0.9.6c-2.woody.4_arm.deb
stable/main/binary-arm/libssl-dev_0.9.6c-2.woody.4_arm.deb
stable/main/binary-arm/openssl_0.9.6c-2.woody.4_arm.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/binary-alpha/openssl_0.9.6c-2.woody.4_alpha.deb
stable/main/binary-alpha/libssl0.9.6_0.9.6c-2.woody.4_alpha.deb
stable/main/binary-alpha/libssl-dev_0.9.6c-2.woody.4_alpha.deb
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543


stable/main/source/openssl_0.9.6c-2.woody.4.dsc
stable/main/binary-i386/openssl_0.9.6c-2.woody.4_i386.deb
stable/main/binary-i386/libssl0.9.6_0.9.6c-2.woody.4_i386.deb
stable/main/binary-i386/libssl-dev_0.9.6c-2.woody.4_i386.deb
stable/main/binary-all/ssleay_0.9.6c-2.woody.4_all.deb
stable/main/source/openssl_0.9.6c-2.woody.4.diff.gz
openssl (0.9.6c-2.woody.4) stable-security; urgency=low
  * Non-maintainer upload by the Security Team
  * Apply upstream changes from CVS to fix ASN1 parsing bugs documented
    in CAN-2003-0544 and CAN-2003-0543

	
stable/main/binary-sparc/nhfsstone_1.0-2woody1_sparc.deb
stable/main/binary-sparc/nfs-kernel-server_1.0-2woody1_sparc.deb
stable/main/binary-sparc/nfs-common_1.0-2woody1_sparc.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-s390/nhfsstone_1.0-2woody1_s390.deb
stable/main/binary-s390/nfs-kernel-server_1.0-2woody1_s390.deb
stable/main/binary-s390/nfs-common_1.0-2woody1_s390.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-powerpc/nfs-kernel-server_1.0-2woody1_powerpc.deb
stable/main/binary-powerpc/nhfsstone_1.0-2woody1_powerpc.deb
stable/main/binary-powerpc/nfs-common_1.0-2woody1_powerpc.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-mipsel/nfs-kernel-server_1.0-2woody1_mipsel.deb
stable/main/binary-mipsel/nhfsstone_1.0-2woody1_mipsel.deb
stable/main/binary-mipsel/nfs-common_1.0-2woody1_mipsel.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-mips/nfs-kernel-server_1.0-2woody1_mips.deb
stable/main/binary-mips/nhfsstone_1.0-2woody1_mips.deb
stable/main/binary-mips/nfs-common_1.0-2woody1_mips.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-m68k/nfs-kernel-server_1.0-2woody1_m68k.deb
stable/main/binary-m68k/nfs-common_1.0-2woody1_m68k.deb
stable/main/binary-m68k/nhfsstone_1.0-2woody1_m68k.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-ia64/nfs-kernel-server_1.0-2woody1_ia64.deb
stable/main/binary-ia64/nhfsstone_1.0-2woody1_ia64.deb
stable/main/binary-ia64/nfs-common_1.0-2woody1_ia64.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-hppa/nhfsstone_1.0-2woody1_hppa.deb
stable/main/binary-hppa/nfs-kernel-server_1.0-2woody1_hppa.deb
stable/main/binary-hppa/nfs-common_1.0-2woody1_hppa.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-arm/nfs-common_1.0-2woody1_arm.deb
stable/main/binary-arm/nhfsstone_1.0-2woody1_arm.deb
stable/main/binary-arm/nfs-kernel-server_1.0-2woody1_arm.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-alpha/nfs-common_1.0-2woody1_alpha.deb
stable/main/binary-alpha/nfs-kernel-server_1.0-2woody1_alpha.deb
stable/main/binary-alpha/nhfsstone_1.0-2woody1_alpha.deb
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/source/nfs-utils_1.0-2woody1.tar.gz
stable/main/binary-i386/nfs-common_1.0-2woody1_i386.deb
stable/main/binary-i386/nhfsstone_1.0-2woody1_i386.deb
stable/main/binary-i386/nfs-kernel-server_1.0-2woody1_i386.deb
stable/main/source/nfs-utils_1.0-2woody1.dsc
nfs-utils (1:1.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overrun (CAN-2003-0252)
    [support/nfs/xlog.c]


stable/main/binary-sparc/zlib1g_1.1.4-1.0woody0_sparc.deb
stable/main/binary-sparc/zlib-bin_1.1.4-1.0woody0_sparc.deb
stable/main/binary-sparc/zlib1g-dev_1.1.4-1.0woody0_sparc.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-s390/zlib-bin_1.1.4-1.0woody0_s390.deb
stable/main/binary-s390/zlib1g-dev_1.1.4-1.0woody0_s390.deb
stable/main/binary-s390/zlib1g_1.1.4-1.0woody0_s390.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-powerpc/zlib1g_1.1.4-1.0woody0_powerpc.deb
stable/main/binary-powerpc/zlib1g-dev_1.1.4-1.0woody0_powerpc.deb
stable/main/binary-powerpc/zlib-bin_1.1.4-1.0woody0_powerpc.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-mipsel/zlib-bin_1.1.4-1.0woody0_mipsel.deb
stable/main/binary-mipsel/zlib1g-dev_1.1.4-1.0woody0_mipsel.deb
stable/main/binary-mipsel/zlib1g_1.1.4-1.0woody0_mipsel.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-mips/zlib1g-dev_1.1.4-1.0woody0_mips.deb
stable/main/binary-mips/zlib-bin_1.1.4-1.0woody0_mips.deb
stable/main/binary-mips/zlib1g_1.1.4-1.0woody0_mips.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-m68k/zlib1g-dev_1.1.4-1.0woody0_m68k.deb
stable/main/binary-m68k/zlib1g_1.1.4-1.0woody0_m68k.deb
stable/main/binary-m68k/zlib-bin_1.1.4-1.0woody0_m68k.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-ia64/zlib1g_1.1.4-1.0woody0_ia64.deb
stable/main/binary-ia64/zlib1g-dev_1.1.4-1.0woody0_ia64.deb
stable/main/binary-ia64/zlib-bin_1.1.4-1.0woody0_ia64.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-hppa/zlib-bin_1.1.4-1.0woody0_hppa.deb
stable/main/binary-hppa/zlib1g-dev_1.1.4-1.0woody0_hppa.deb
stable/main/binary-hppa/zlib1g_1.1.4-1.0woody0_hppa.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-arm/zlib-bin_1.1.4-1.0woody0_arm.deb
stable/main/binary-arm/zlib1g-dev_1.1.4-1.0woody0_arm.deb
stable/main/binary-arm/zlib1g_1.1.4-1.0woody0_arm.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-alpha/zlib1g-dev_1.1.4-1.0woody0_alpha.deb
stable/main/binary-alpha/zlib1g_1.1.4-1.0woody0_alpha.deb
stable/main/binary-alpha/zlib-bin_1.1.4-1.0woody0_alpha.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-i386/zlib-bin_1.1.4-1.0woody0_i386.deb
stable/main/binary-i386/zlib1-altdev_1.1.4-1.0woody0_i386.deb
stable/main/binary-i386/zlib1g_1.1.4-1.0woody0_i386.deb
stable/main/source/zlib_1.1.4-1.0woody0.diff.gz
stable/main/binary-i386/zlib1_1.1.4-1.0woody0_i386.deb
stable/main/source/zlib_1.1.4-1.0woody0.dsc
stable/main/binary-i386/zlib1g-dev_1.1.4-1.0woody0_i386.deb
zlib (1:1.1.4-1.0woody0) stable; urgency=low
  * Define HAS_vsnprintf in gzio.c in order to avoid buffer overflows
    (closes: #184763).
  * Remove user Emacs variables from changelog.


stable/main/binary-sparc/zblast-x11_1.2pre-5woody2_sparc.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-s390/zblast-x11_1.2pre-5woody2_s390.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-powerpc/zblast-x11_1.2pre-5woody2_powerpc.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-mipsel/zblast-x11_1.2pre-5woody2_mipsel.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-mips/zblast-x11_1.2pre-5woody2_mips.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-m68k/zblast-x11_1.2pre-5woody2_m68k.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-ia64/zblast-x11_1.2pre-5woody2_ia64.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-hppa/zblast-x11_1.2pre-5woody2_hppa.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-arm/zblast-x11_1.2pre-5woody2_arm.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-alpha/zblast-x11_1.2pre-5woody2_alpha.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-i386/zblast-svgalib_1.2pre-5woody2_i386.deb
stable/main/binary-all/zblast-data_1.2pre-5woody2_all.deb
stable/main/source/zblast_1.2pre-5woody2.diff.gz
stable/main/source/zblast_1.2pre-5woody2.dsc
stable/main/binary-i386/zblast-x11_1.2pre-5woody2_i386.deb
zblast (1.2pre-5woody2) stable-security; urgency=high
  * Fix alpha build by disabling svgalib; it doesn't exist on alpha
    anymore


stable/main/binary-sparc/xtokkaetama_1.0b-6woody2_sparc.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-s390/xtokkaetama_1.0b-6woody2_s390.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-powerpc/xtokkaetama_1.0b-6woody2_powerpc.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-mipsel/xtokkaetama_1.0b-6woody2_mipsel.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-mips/xtokkaetama_1.0b-6woody2_mips.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-m68k/xtokkaetama_1.0b-6woody2_m68k.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-ia64/xtokkaetama_1.0b-6woody2_ia64.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-hppa/xtokkaetama_1.0b-6woody2_hppa.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-arm/xtokkaetama_1.0b-6woody2_arm.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-alpha/xtokkaetama_1.0b-6woody2_alpha.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/source/xtokkaetama_1.0b-6woody2.dsc
stable/main/source/xtokkaetama_1.0b-6woody2.diff.gz
stable/main/binary-i386/xtokkaetama_1.0b-6woody2_i386.deb
xtokkaetama (1.0b-6woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from unstable 1.0b-9 to fix another buffer overflow, with -nickname
    (CAN-2003-0652)


stable/main/binary-s390/xpdf-reader_1.00-3.1_s390.deb
stable/main/binary-s390/xpdf-utils_1.00-3.1_s390.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-powerpc/xpdf-utils_1.00-3.1_powerpc.deb
stable/main/binary-powerpc/xpdf-reader_1.00-3.1_powerpc.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-mipsel/xpdf-utils_1.00-3.1_mipsel.deb
stable/main/binary-mipsel/xpdf-reader_1.00-3.1_mipsel.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-mips/xpdf-reader_1.00-3.1_mips.deb
stable/main/binary-mips/xpdf-utils_1.00-3.1_mips.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-m68k/xpdf-utils_1.00-3.1_m68k.deb
stable/main/binary-m68k/xpdf-reader_1.00-3.1_m68k.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-ia64/xpdf-utils_1.00-3.1_ia64.deb
stable/main/binary-ia64/xpdf-reader_1.00-3.1_ia64.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-i386/xpdf-utils_1.00-3.1_i386.deb
stable/main/binary-i386/xpdf-reader_1.00-3.1_i386.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-hppa/xpdf-reader_1.00-3.1_hppa.deb
stable/main/binary-hppa/xpdf-utils_1.00-3.1_hppa.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-arm/xpdf-reader_1.00-3.1_arm.deb
stable/main/binary-arm/xpdf-utils_1.00-3.1_arm.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-alpha/xpdf-reader_1.00-3.1_alpha.deb
stable/main/binary-alpha/xpdf-utils_1.00-3.1_alpha.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-sparc/xpdf-utils_1.00-3.1_sparc.deb
stable/main/binary-sparc/xpdf-reader_1.00-3.1_sparc.deb
stable/main/source/xpdf_1.00-3.1.diff.gz
stable/main/binary-all/xpdf-common_1.00-3.1_all.deb
stable/main/source/xpdf_1.00-3.1.dsc
stable/main/binary-all/xpdf_1.00-3.1_all.deb
xpdf (1.00-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed integer overflow that can lead to executing arbitrary code


stable/main/binary-sparc/xnc_4.4.7-3.woody.1_sparc.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-s390/xnc_4.4.7-3.woody.1_s390.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-powerpc/xnc_4.4.7-3.woody.1_powerpc.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-mipsel/xnc_4.4.7-3.woody.1_mipsel.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-mips/xnc_4.4.7-3.woody.1_mips.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-m68k/xnc_4.4.7-3.woody.1_m68k.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-ia64/xnc_4.4.7-3.woody.1_ia64.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-hppa/xnc_4.4.7-3.woody.1_hppa.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-arm/xnc_4.4.7-3.woody.1_arm.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-alpha/xnc_4.4.7-3.woody.1_alpha.deb
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/source/xnc_4.4.7-3.woody.1.diff.gz
stable/main/binary-i386/xnc_4.4.7-3.woody.1_i386.deb
stable/main/source/xnc_4.4.7-3.woody.1.dsc
xnc (4.4.7-3.woody.1) stable; urgency=high
  * Version prepared for 3.0r1. Closes: #149191
  * Previous version was causing Debian menu system breakage when installed.
    Update-menus was completly disfunctional.
    The fix is more than trivial - required me to change 2 chars in rules,
    and add "_" to two filenames. Please let this version go into stable.


stable/main/binary-sparc/xgalaga_2.0.34-19woody1_sparc.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-s390/xgalaga_2.0.34-19woody1_s390.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-powerpc/xgalaga_2.0.34-19woody1_powerpc.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-mipsel/xgalaga_2.0.34-19woody1_mipsel.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-mips/xgalaga_2.0.34-19woody1_mips.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-m68k/xgalaga_2.0.34-19woody1_m68k.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-ia64/xgalaga_2.0.34-19woody1_ia64.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-hppa/xgalaga_2.0.34-19woody1_hppa.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-arm/xgalaga_2.0.34-19woody1_arm.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-alpha/xgalaga_2.0.34-19woody1_alpha.deb
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/source/xgalaga_2.0.34-19woody1.diff.gz
stable/main/binary-i386/xgalaga_2.0.34-19woody1_i386.deb
stable/main/source/xgalaga_2.0.34-19woody1.dsc
xgalaga (2.0.34-19woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Steve Kemp to fix buffer overflow on long HOME
    environment variable (CAN-2003-0454)


stable/main/binary-sparc/xfstt_1.2.1-3_sparc.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-s390/xfstt_1.2.1-3_s390.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-powerpc/xfstt_1.2.1-3_powerpc.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-mipsel/xfstt_1.2.1-3_mipsel.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-mips/xfstt_1.2.1-3_mips.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-m68k/xfstt_1.2.1-3_m68k.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-ia64/xfstt_1.2.1-3_ia64.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-hppa/xfstt_1.2.1-3_hppa.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-arm/xfstt_1.2.1-3_arm.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-alpha/xfstt_1.2.1-3_alpha.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/source/xfstt_1.2.1-3.tar.gz
stable/main/source/xfstt_1.2.1-3.dsc
stable/main/binary-i386/xfstt_1.2.1-3_i386.deb
xfstt (1.2.1-3) stable-security; urgency=high
  * New Maintainer.
  * Fixed multiple buffer overflows in the network packet handling:
    CAN-2003-0581.
  * Fixed a possible security problem by checking the byteorder magic in
    the connection handshake:
    CAN-2003-0625, bugtraq id 8255.


stable/main/binary-s390/xfsdump_2.0.1-2_s390.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-powerpc/xfsdump_2.0.1-2_powerpc.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-mipsel/xfsdump_2.0.1-2_mipsel.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-mips/xfsdump_2.0.1-2_mips.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-m68k/xfsdump_2.0.1-2_m68k.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-ia64/xfsdump_2.0.1-2_ia64.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-i386/xfsdump_2.0.1-2_i386.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-hppa/xfsdump_2.0.1-2_hppa.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-arm/xfsdump_2.0.1-2_arm.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-alpha/xfsdump_2.0.1-2_alpha.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/source/xfsdump_2.0.1-2.dsc
stable/main/source/xfsdump_2.0.1-2.tar.gz
stable/main/binary-sparc/xfsdump_2.0.1-2_sparc.deb
xfsdump (2.0.1-2) stable-security; urgency=high
  * New release to fix security issues in interaction between
    xfsdump(8) and xfsdq(8).


stable/main/binary-sparc/xterm_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xutils_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/libdps1-dbg_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibs-dbg_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xprt_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/proxymngr_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/libxaw6-dev_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/libxaw6_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibosmesa3_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/libxaw7-dev_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/libxaw7-dbg_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/libdps1_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibs-dev_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibmesa3_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xserver-xfree86_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xnest_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/lbxproxy_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibosmesa3-dbg_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xdm_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xbase-clients_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibosmesa-dev_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibs-pic_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/libxaw6-dbg_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibmesa-dev_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/x-window-system-core_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xfs_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibmesa3-dbg_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xmh_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xfwp_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/libdps-dev_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/libxaw7_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xserver-common_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xvfb_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/twm_4.1.0-16woody1_sparc.deb
stable/main/binary-sparc/xlibs_4.1.0-16woody1_sparc.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-s390/xterm_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xlibmesa3_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xvfb_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xbase-clients_4.1.0-16woody1_s390.deb
stable/main/binary-s390/proxymngr_4.1.0-16woody1_s390.deb
stable/main/binary-s390/lbxproxy_4.1.0-16woody1_s390.deb
stable/main/binary-s390/libdps1_4.1.0-16woody1_s390.deb
stable/main/binary-s390/libxaw7_4.1.0-16woody1_s390.deb
stable/main/binary-s390/libdps-dev_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xlibs-dbg_4.1.0-16woody1_s390.deb
stable/main/binary-s390/libxaw6-dev_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xlibmesa-dev_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xdm_4.1.0-16woody1_s390.deb
stable/main/binary-s390/libxaw6_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xfwp_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xlibs_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xmh_4.1.0-16woody1_s390.deb
stable/main/binary-s390/x-window-system-core_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xnest_4.1.0-16woody1_s390.deb
stable/main/binary-s390/libxaw7-dev_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xprt_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xutils_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xserver-common_4.1.0-16woody1_s390.deb
stable/main/binary-s390/twm_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xlibs-pic_4.1.0-16woody1_s390.deb
stable/main/binary-s390/libdps1-dbg_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xlibs-dev_4.1.0-16woody1_s390.deb
stable/main/binary-s390/libxaw7-dbg_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xlibmesa3-dbg_4.1.0-16woody1_s390.deb
stable/main/binary-s390/libxaw6-dbg_4.1.0-16woody1_s390.deb
stable/main/binary-s390/xfs_4.1.0-16woody1_s390.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-mipsel/xserver-xfree86_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xserver-common_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/lbxproxy_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/libxaw7_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/libdps1_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xterm_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xdm_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/libxaw6_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/proxymngr_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xvfb_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/twm_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/x-window-system-core_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xlibs_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xfs_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/libxaw7-dbg_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xutils_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xlibs-dev_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xlibmesa-dev_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/libxaw6-dev_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/libdps1-dbg_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xbase-clients_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xprt_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xfwp_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xnest_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xmh_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/libxaw6-dbg_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/libxaw7-dev_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xlibs-dbg_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/libdps-dev_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xlibmesa3-dbg_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xlibs-pic_4.1.0-16woody1_mipsel.deb
stable/main/binary-mipsel/xlibmesa3_4.1.0-16woody1_mipsel.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-mips/libxaw6-dev_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xutils_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xlibmesa3_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xserver-xfree86_4.1.0-16woody1_mips.deb
stable/main/binary-mips/x-window-system-core_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xlibs_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xvfb_4.1.0-16woody1_mips.deb
stable/main/binary-mips/twm_4.1.0-16woody1_mips.deb
stable/main/binary-mips/libdps1_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xterm_4.1.0-16woody1_mips.deb
stable/main/binary-mips/libxaw7-dbg_4.1.0-16woody1_mips.deb
stable/main/binary-mips/libxaw7_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xlibs-dev_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xdm_4.1.0-16woody1_mips.deb
stable/main/binary-mips/libxaw6-dbg_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xlibmesa-dev_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xmh_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xserver-common_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xbase-clients_4.1.0-16woody1_mips.deb
stable/main/binary-mips/libxaw6_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xnest_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xfs_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xfwp_4.1.0-16woody1_mips.deb
stable/main/binary-mips/proxymngr_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xlibs-pic_4.1.0-16woody1_mips.deb
stable/main/binary-mips/libdps1-dbg_4.1.0-16woody1_mips.deb
stable/main/binary-mips/libxaw7-dev_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xprt_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xlibmesa3-dbg_4.1.0-16woody1_mips.deb
stable/main/binary-mips/libdps-dev_4.1.0-16woody1_mips.deb
stable/main/binary-mips/xlibs-dbg_4.1.0-16woody1_mips.deb
stable/main/binary-mips/lbxproxy_4.1.0-16woody1_mips.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-m68k/libxaw6-dbg_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xserver-xfree86_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xdm_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xbase-clients_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/libdps1_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/x-window-system-core_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xterm_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/proxymngr_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xlibmesa3_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/libxaw6-dev_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/libxaw7-dev_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/libdps1-dbg_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xfs_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xlibmesa3-dbg_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/lbxproxy_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xvfb_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xlibmesa-dev_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xlibs-dev_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xmh_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xfwp_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/libxaw6_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xlibs_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xlibs-pic_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xserver-common_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/libxaw7_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xprt_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/libxaw7-dbg_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xlibs-dbg_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/libdps-dev_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xutils_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/twm_4.1.0-16woody1_m68k.deb
stable/main/binary-m68k/xnest_4.1.0-16woody1_m68k.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-ia64/libxaw6-dev_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibmesa3_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibosmesa3-dbg_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/libdps1_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/x-window-system-core_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/libxaw7-dbg_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibs_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xvfb_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xprt_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/libdps-dev_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibs-dbg_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/lbxproxy_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xdm_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xbase-clients_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/libxaw6_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xserver-xfree86_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xfwp_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xmh_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xserver-common_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/libxaw6-dbg_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xterm_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xfs_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/libxaw7-dev_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibmesa3-dbg_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xnest_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xutils_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibs-pic_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/proxymngr_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/libdps1-dbg_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibosmesa-dev_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibosmesa3_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibs-dev_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/libxaw7_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/xlibmesa-dev_4.1.0-16woody1_ia64.deb
stable/main/binary-ia64/twm_4.1.0-16woody1_ia64.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-i386/lbxproxy_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibmesa3-dbg_4.1.0-16woody1_i386.deb
stable/main/binary-i386/libxaw7-dev_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibosmesa3_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xutils_4.1.0-16woody1_i386.deb
stable/main/binary-i386/proxymngr_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xnest_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xbase-clients_4.1.0-16woody1_i386.deb
stable/main/binary-i386/libdps1_4.1.0-16woody1_i386.deb
stable/main/binary-i386/x-window-system-core_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xvfb_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xterm_4.1.0-16woody1_i386.deb
stable/main/binary-i386/libxaw6_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibmesa-dev_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xprt_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xmh_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibosmesa-dev_4.1.0-16woody1_i386.deb
stable/main/binary-i386/libxaw7_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibs_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xfwp_4.1.0-16woody1_i386.deb
stable/main/binary-i386/libxaw7-dbg_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xfs_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibs-dev_4.1.0-16woody1_i386.deb
stable/main/binary-i386/libxaw6-dbg_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xserver-common_4.1.0-16woody1_i386.deb
stable/main/binary-i386/libdps1-dbg_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xserver-xfree86_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibs-pic_4.1.0-16woody1_i386.deb
stable/main/binary-i386/twm_4.1.0-16woody1_i386.deb
stable/main/binary-i386/libxaw6-dev_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xdm_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibs-dbg_4.1.0-16woody1_i386.deb
stable/main/binary-i386/libdps-dev_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibosmesa3-dbg_4.1.0-16woody1_i386.deb
stable/main/binary-i386/xlibmesa3_4.1.0-16woody1_i386.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-hppa/libxaw6_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xfwp_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xmh_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/twm_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xdm_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xlibmesa3-dbg_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xprt_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/libxaw7-dev_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xutils_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xserver-common_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xfs_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xlibs-dev_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xnest_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/libdps-dev_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xterm_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/libxaw6-dev_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xlibs-dbg_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xlibmesa-dev_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xvfb_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xlibs_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xlibmesa3_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/libdps1_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/libxaw7-dbg_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/libxaw6-dbg_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/lbxproxy_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/libxaw7_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/libdps1-dbg_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/x-window-system-core_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xbase-clients_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/proxymngr_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xlibs-pic_4.1.0-16woody1_hppa.deb
stable/main/binary-hppa/xserver-xfree86_4.1.0-16woody1_hppa.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-arm/xlibs-dbg_4.1.0-16woody1_arm.deb
stable/main/binary-arm/libdps-dev_4.1.0-16woody1_arm.deb
stable/main/binary-arm/libxaw7_4.1.0-16woody1_arm.deb
stable/main/binary-arm/libxaw6-dbg_4.1.0-16woody1_arm.deb
stable/main/binary-arm/libxaw7-dbg_4.1.0-16woody1_arm.deb
stable/main/binary-arm/proxymngr_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xnest_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xbase-clients_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xlibmesa-dev_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xserver-xfree86_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xlibs_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xlibs-pic_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xlibmesa3_4.1.0-16woody1_arm.deb
stable/main/binary-arm/libdps1-dbg_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xserver-common_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xlibs-dev_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xlibmesa3-dbg_4.1.0-16woody1_arm.deb
stable/main/binary-arm/libxaw7-dev_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xdm_4.1.0-16woody1_arm.deb
stable/main/binary-arm/x-window-system-core_4.1.0-16woody1_arm.deb
stable/main/binary-arm/libxaw6-dev_4.1.0-16woody1_arm.deb
stable/main/binary-arm/lbxproxy_4.1.0-16woody1_arm.deb
stable/main/binary-arm/twm_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xmh_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xprt_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xvfb_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xterm_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xfs_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xutils_4.1.0-16woody1_arm.deb
stable/main/binary-arm/libdps1_4.1.0-16woody1_arm.deb
stable/main/binary-arm/xfwp_4.1.0-16woody1_arm.deb
stable/main/binary-arm/libxaw6_4.1.0-16woody1_arm.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-alpha/xlibosmesa3-dbg_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/libxaw6-dev_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/libxaw6_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xserver-xfree86_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xvfb_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xlibmesa3_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xserver-common_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xutils_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/libdps1_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xlibosmesa3_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/twm_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/proxymngr_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xmh_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xlibs-pic_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/libxaw7-dbg_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xterm_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xlibmesa-dev_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/libxaw6-dbg_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xnest_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xlibosmesa-dev_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xprt_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/libxaw7_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xdm_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/x-window-system-core_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xbase-clients_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xlibs-dbg_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/lbxproxy_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xfwp_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xlibs-dev_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/libdps1-dbg_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xfs_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/libxaw7-dev_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/libdps-dev_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xlibs_4.1.0-16woody1_alpha.deb
stable/main/binary-alpha/xlibmesa3-dbg_4.1.0-16woody1_alpha.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-all/xfonts-scalable_4.1.0-16woody1_all.deb
stable/main/binary-all/xfonts-cyrillic_4.1.0-16woody1_all.deb
stable/main/source/xfree86_4.1.0-16woody1.diff.gz
stable/main/binary-all/xfonts-75dpi-transcoded_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/xmh_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xfs_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xlibmesa3_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xlibs-pic_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xlibosmesa3_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xvfb_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/twm_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xlibosmesa3-dbg_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xserver-xfree86_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xlibs-dev_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/libdps1_4.1.0-16woody1_powerpc.deb
stable/main/binary-all/xfonts-pex_4.1.0-16woody1_all.deb
stable/main/binary-all/xfree86-common_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/xbase-clients_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xlibosmesa-dev_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/libxaw7-dbg_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/libxaw7_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/libxaw6-dev_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/x-window-system-core_4.1.0-16woody1_powerpc.deb
stable/main/binary-all/xfonts-75dpi_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/xprt_4.1.0-16woody1_powerpc.deb
stable/main/binary-all/xlib6g-dev_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/libdps-dev_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xfwp_4.1.0-16woody1_powerpc.deb
stable/main/binary-all/xfonts-base_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/xnest_4.1.0-16woody1_powerpc.deb
stable/main/binary-all/x-window-system_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/xutils_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xserver-common_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/libxaw7-dev_4.1.0-16woody1_powerpc.deb
stable/main/binary-all/xfonts-100dpi-transcoded_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/xdm_4.1.0-16woody1_powerpc.deb
stable/main/binary-all/xlib6g_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/proxymngr_4.1.0-16woody1_powerpc.deb
stable/main/source/xfree86_4.1.0-16woody1.dsc
stable/main/binary-powerpc/xlibmesa3-dbg_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xlibs_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/lbxproxy_4.1.0-16woody1_powerpc.deb
stable/main/binary-all/xfonts-100dpi_4.1.0-16woody1_all.deb
stable/main/binary-all/xfonts-base-transcoded_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/libxaw6-dbg_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xlibmesa-dev_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/xterm_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/libdps1-dbg_4.1.0-16woody1_powerpc.deb
stable/main/binary-all/xspecs_4.1.0-16woody1_all.deb
stable/main/binary-powerpc/xlibs-dbg_4.1.0-16woody1_powerpc.deb
stable/main/binary-powerpc/libxaw6_4.1.0-16woody1_powerpc.deb
xfree86 (4.1.0-16woody1) stable-security; urgency=high
  * Security update release.  Resolves the following issues:
    + CAN-2003-0063 (xterm window title reporting can deceive user)
    + CAN-2003-0071 (xterm susceptible to DEC UDK sequence DoS attack)
    + CAN-2002-0164 (flaw in X server's MIT-SHM extension permits user owning
                    X session to read and write arbitrary shared memory
                    segments)
    + CAN-2003-0730 (multiple integer overflows in the font libraries for
                    XFree86 allow local or remote attackers to cause a denial
                    of service or execute arbitrary code via heap-based and
                    stack-based buffer overflow attacks)
  * patch #069: new; disable xterm's window title reporting escape sequence
  * patch #070: new; fix term to ignore malformed DEC UDK escape sequences
    instead of locking up
  * patch #071: new; updated fix to MIT-SHM vulnerability from upstream CVS:
    - Implement LocalClientCred() to return the credentials of local clients
      connected through Unix domain sockets on systems that have the required
      support (for now recent Linux, FreeBSD >= 4.6, OpenBSD >= 3.0 are
      implemented), and use that in ShmAttach() to grant access to the client.
      When client credentials are not available, require world accessibility.
    The original fix did not cover the case where the X server is started
    from an X display manager such as xdm.
  * patch #072: new; fixes for integer overflows in font libraries from
    upstream CVS:
    - fixes for potential integer overflows in font libraries (blexim, Matthieu
      Herrb).
    - For integer overflow tests, use SIZE_MAX which is more standard than
      SIZE_T_MAX, and default to ULONG_MAX for the case of LP64 systems.  Based
      on reports by Matthias Scheler and Alan Coopersmith (Bugzilla #646).
  * patch #400: resynced offsets in the wake of patch #071


stable/main/binary-sparc/xbl_1.0k-3woody2_sparc.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/binary-s390/xbl_1.0k-3woody2_s390.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/binary-powerpc/xbl_1.0k-3woody2_powerpc.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/binary-mipsel/xbl_1.0k-3woody2_mipsel.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/binary-mips/xbl_1.0k-3woody2_mips.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/binary-m68k/xbl_1.0k-3woody2_m68k.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/binary-ia64/xbl_1.0k-3woody2_ia64.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/binary-hppa/xbl_1.0k-3woody2_hppa.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/binary-arm/xbl_1.0k-3woody2_arm.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/binary-alpha/xbl_1.0k-3woody2_alpha.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/source/xbl_1.0k-3woody2.dsc
stable/main/source/xbl_1.0k-3woody2.diff.gz
stable/main/binary-i386/xbl_1.0k-3woody2_i386.deb
xbl (1.0k-3woody2) stable-security; urgency=low
  * Fixed another buffer overflow reported by an anonymous user.


stable/main/source/x-face-el_1.3.6.19-1woody1.dsc
stable/main/source/x-face-el_1.3.6.19-1woody1.diff.gz
stable/main/binary-all/x-face-el_1.3.6.19-1woody1_all.deb
x-face-el (1.3.6.19-1woody1) stable-security; urgency=high
  * Fix insecure tempfile handling. (backport from 1.3.6.23)


stable/main/binary-sparc/wu-ftpd_2.6.2-3woody2_sparc.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/binary-s390/wu-ftpd_2.6.2-3woody2_s390.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/binary-powerpc/wu-ftpd_2.6.2-3woody2_powerpc.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/binary-mipsel/wu-ftpd_2.6.2-3woody2_mipsel.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/binary-mips/wu-ftpd_2.6.2-3woody2_mips.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/binary-m68k/wu-ftpd_2.6.2-3woody2_m68k.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/binary-ia64/wu-ftpd_2.6.2-3woody2_ia64.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/binary-hppa/wu-ftpd_2.6.2-3woody2_hppa.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/binary-arm/wu-ftpd_2.6.2-3woody2_arm.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/binary-alpha/wu-ftpd_2.6.2-3woody2_alpha.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/source/wu-ftpd_2.6.2-3woody2.diff.gz
stable/main/binary-all/wu-ftpd-academ_2.6.2-3woody2_all.deb
stable/main/source/wu-ftpd_2.6.2-3woody2.dsc
stable/main/binary-i386/wu-ftpd_2.6.2-3woody2_i386.deb
wu-ftpd (2.6.2-3woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prefix %s substitutions in ftpconversions with '--' to avoid option
    processing.  In the case of tar, this would allow arbitrary command
    execution (CVE-1999-0997)


stable/main/source/wemi_1.14.0.20010802wemiko-1.3woody1.diff.gz
stable/main/source/wemi_1.14.0.20010802wemiko-1.3woody1.dsc
stable/main/binary-all/wemi_1.14.0.20010802wemiko-1.3woody1_all.deb
wemi (1.14.0.20010802wemiko-1.3woody1) stable; urgency=high
  * Non-maintainer upload by the Stable Release Manager
  * Only bump up the version number so it'll be accepted by katie


stable/main/binary-sparc/webfs_1.17.2_sparc.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-s390/webfs_1.17.2_s390.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-powerpc/webfs_1.17.2_powerpc.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-mipsel/webfs_1.17.2_mipsel.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-mips/webfs_1.17.2_mips.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-m68k/webfs_1.17.2_m68k.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-ia64/webfs_1.17.2_ia64.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-hppa/webfs_1.17.2_hppa.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-arm/webfs_1.17.2_arm.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-alpha/webfs_1.17.2_alpha.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/source/webfs_1.17.2.dsc
stable/main/source/webfs_1.17.2.tar.gz
stable/main/binary-i386/webfs_1.17.2_i386.deb
webfs (1.17.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows (CAN-2003-0833)
  * Disallow ".." as virtualhost name, to prevent file listing exposure
    (CAN-2003-0832)


stable/main/binary-sparc/w3mmee-ssl_0.3.p23.3-1.5_sparc.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-s390/w3mmee-ssl_0.3.p23.3-1.5_s390.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-mipsel/w3mmee-ssl_0.3.p23.3-1.5_mipsel.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-mips/w3mmee-ssl_0.3.p23.3-1.5_mips.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-m68k/w3mmee-ssl_0.3.p23.3-1.5_m68k.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-ia64/w3mmee-ssl_0.3.p23.3-1.5_ia64.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-i386/w3mmee-ssl_0.3.p23.3-1.5_i386.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-hppa/w3mmee-ssl_0.3.p23.3-1.5_hppa.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-arm/w3mmee-ssl_0.3.p23.3-1.5_arm.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-alpha/w3mmee-ssl_0.3.p23.3-1.5_alpha.deb
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-powerpc/w3mmee-ssl_0.3.p23.3-1.5_powerpc.deb
stable/main/source/w3mmee-ssl_0.3.p23.3-1.5.dsc
stable/main/source/w3mmee-ssl_0.3.p23.3-1.5.diff.gz
w3mmee-ssl (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-s390/w3mmee_0.3.p23.3-1.5_s390.deb
stable/main/binary-s390/w3mmee-img_0.3.p23.3-1.5_s390.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-powerpc/w3mmee_0.3.p23.3-1.5_powerpc.deb
stable/main/binary-powerpc/w3mmee-img_0.3.p23.3-1.5_powerpc.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-mipsel/w3mmee_0.3.p23.3-1.5_mipsel.deb
stable/main/binary-mipsel/w3mmee-img_0.3.p23.3-1.5_mipsel.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-mips/w3mmee_0.3.p23.3-1.5_mips.deb
stable/main/binary-mips/w3mmee-img_0.3.p23.3-1.5_mips.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-m68k/w3mmee-img_0.3.p23.3-1.5_m68k.deb
stable/main/binary-m68k/w3mmee_0.3.p23.3-1.5_m68k.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-ia64/w3mmee_0.3.p23.3-1.5_ia64.deb
stable/main/binary-ia64/w3mmee-img_0.3.p23.3-1.5_ia64.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-i386/w3mmee-img_0.3.p23.3-1.5_i386.deb
stable/main/binary-i386/w3mmee_0.3.p23.3-1.5_i386.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-hppa/w3mmee_0.3.p23.3-1.5_hppa.deb
stable/main/binary-hppa/w3mmee-img_0.3.p23.3-1.5_hppa.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-arm/w3mmee-img_0.3.p23.3-1.5_arm.deb
stable/main/binary-arm/w3mmee_0.3.p23.3-1.5_arm.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-alpha/w3mmee-img_0.3.p23.3-1.5_alpha.deb
stable/main/binary-alpha/w3mmee_0.3.p23.3-1.5_alpha.deb
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-sparc/w3mmee-img_0.3.p23.3-1.5_sparc.deb
stable/main/binary-sparc/w3mmee_0.3.p23.3-1.5_sparc.deb
stable/main/source/w3mmee_0.3.p23.3-1.5.dsc
stable/main/source/w3mmee_0.3.p23.3-1.5.diff.gz
w3mmee (0.3.p23.3-1.5) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-s390/w3m-ssl_0.3-2.4_s390.deb
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-powerpc/w3m-ssl_0.3-2.4_powerpc.deb
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-mipsel/w3m-ssl_0.3-2.4_mipsel.deb
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-mips/w3m-ssl_0.3-2.4_mips.deb
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-m68k/w3m-ssl_0.3-2.4_m68k.deb
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-i386/w3m-ssl_0.3-2.4_i386.deb
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-hppa/w3m-ssl_0.3-2.4_hppa.deb
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-arm/w3m-ssl_0.3-2.4_arm.deb
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-alpha/w3m-ssl_0.3-2.4_alpha.deb
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-sparc/w3m-ssl_0.3-2.4_sparc.deb
stable/main/source/w3m-ssl_0.3-2.4.diff.gz
stable/main/source/w3m-ssl_0.3-2.4.dsc
w3m-ssl (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-s390/w3m-img_0.3-2.4_s390.deb
stable/main/binary-s390/w3m_0.3-2.4_s390.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-powerpc/w3m-img_0.3-2.4_powerpc.deb
stable/main/binary-powerpc/w3m_0.3-2.4_powerpc.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-mipsel/w3m-img_0.3-2.4_mipsel.deb
stable/main/binary-mipsel/w3m_0.3-2.4_mipsel.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-mips/w3m-img_0.3-2.4_mips.deb
stable/main/binary-mips/w3m_0.3-2.4_mips.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-m68k/w3m_0.3-2.4_m68k.deb
stable/main/binary-m68k/w3m-img_0.3-2.4_m68k.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-i386/w3m_0.3-2.4_i386.deb
stable/main/binary-i386/w3m-img_0.3-2.4_i386.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-hppa/w3m-img_0.3-2.4_hppa.deb
stable/main/binary-hppa/w3m_0.3-2.4_hppa.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-arm/w3m_0.3-2.4_arm.deb
stable/main/binary-arm/w3m-img_0.3-2.4_arm.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-alpha/w3m_0.3-2.4_alpha.deb
stable/main/binary-alpha/w3m-img_0.3-2.4_alpha.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/source/w3m_0.3-2.4.dsc
stable/main/binary-sparc/w3m_0.3-2.4_sparc.deb
stable/main/source/w3m_0.3-2.4.diff.gz
stable/main/binary-sparc/w3m-img_0.3-2.4_sparc.deb
w3m (0.3-2.4) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Rebuilt for security.debian.org


stable/main/binary-sparc/util-linux_2.11n-7_sparc.deb
stable/main/binary-sparc/mount_2.11n-7_sparc.deb
stable/main/binary-sparc/bsdutils_2.11n-7_sparc.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-s390/mount_2.11n-7_s390.deb
stable/main/binary-s390/util-linux_2.11n-7_s390.deb
stable/main/binary-s390/bsdutils_2.11n-7_s390.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-powerpc/bsdutils_2.11n-7_powerpc.deb
stable/main/binary-powerpc/util-linux_2.11n-7_powerpc.deb
stable/main/binary-powerpc/mount_2.11n-7_powerpc.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-mipsel/mount_2.11n-7_mipsel.deb
stable/main/binary-mipsel/util-linux_2.11n-7_mipsel.deb
stable/main/binary-mipsel/bsdutils_2.11n-7_mipsel.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-mips/util-linux_2.11n-7_mips.deb
stable/main/binary-mips/bsdutils_2.11n-7_mips.deb
stable/main/binary-mips/mount_2.11n-7_mips.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-m68k/mount_2.11n-7_m68k.deb
stable/main/binary-m68k/util-linux_2.11n-7_m68k.deb
stable/main/binary-m68k/bsdutils_2.11n-7_m68k.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-ia64/bsdutils_2.11n-7_ia64.deb
stable/main/binary-ia64/util-linux_2.11n-7_ia64.deb
stable/main/binary-ia64/mount_2.11n-7_ia64.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-hppa/bsdutils_2.11n-7_hppa.deb
stable/main/binary-hppa/util-linux_2.11n-7_hppa.deb
stable/main/binary-hppa/mount_2.11n-7_hppa.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-arm/mount_2.11n-7_arm.deb
stable/main/binary-arm/bsdutils_2.11n-7_arm.deb
stable/main/binary-arm/util-linux_2.11n-7_arm.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-alpha/mount_2.11n-7_alpha.deb
stable/main/binary-alpha/util-linux_2.11n-7_alpha.deb
stable/main/binary-alpha/bsdutils_2.11n-7_alpha.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-all/util-linux-locales_2.11n-7_all.deb
stable/main/source/util-linux_2.11n-7.dsc
stable/main/binary-i386/util-linux_2.11n-7_i386.deb
stable/main/binary-i386/bsdutils_2.11n-7_i386.deb
stable/main/source/util-linux_2.11n-7.diff.gz
stable/main/binary-i386/mount_2.11n-7_i386.deb
util-linux (2.11n-7) stable; urgency=low
  *  GAH! The stupid woody-chroot, wasn't.


stable/main/binary-sparc/unzip_5.50-1woody2_sparc.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-s390/unzip_5.50-1woody2_s390.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-powerpc/unzip_5.50-1woody2_powerpc.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-mipsel/unzip_5.50-1woody2_mipsel.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-mips/unzip_5.50-1woody2_mips.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-m68k/unzip_5.50-1woody2_m68k.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-ia64/unzip_5.50-1woody2_ia64.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-hppa/unzip_5.50-1woody2_hppa.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-arm/unzip_5.50-1woody2_arm.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-alpha/unzip_5.50-1woody2_alpha.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/source/unzip_5.50-1woody2.dsc
stable/main/source/unzip_5.50-1woody2.diff.gz
stable/main/binary-i386/unzip_5.50-1woody2_i386.deb
unzip (5.50-1woody2) stable-security; urgency=high
  * Fixed "unzip directory traversal revisited" again (Closes: #206439).
    There was still a missing case that the previous patch didn't catch.
    Patch borrowed from unzip-5.50-33.src.rpm.
  * For reference, this is (still) CAN-2003-0282.


stable/main/binary-sparc/typespeed_0.4.1-2.2_sparc.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-s390/typespeed_0.4.1-2.2_s390.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-powerpc/typespeed_0.4.1-2.2_powerpc.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-mipsel/typespeed_0.4.1-2.2_mipsel.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-mips/typespeed_0.4.1-2.2_mips.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-m68k/typespeed_0.4.1-2.2_m68k.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-ia64/typespeed_0.4.1-2.2_ia64.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-hppa/typespeed_0.4.1-2.2_hppa.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-arm/typespeed_0.4.1-2.2_arm.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-alpha/typespeed_0.4.1-2.2_alpha.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/source/typespeed_0.4.1-2.2.dsc
stable/main/source/typespeed_0.4.1-2.2.diff.gz
stable/main/binary-i386/typespeed_0.4.1-2.2_i386.deb
typespeed (0.4.1-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix more buffer overflows in net_swapscore [network.c]


stable/main/binary-sparc/traceroute-nanog_6.1.1-1.3_sparc.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/binary-s390/traceroute-nanog_6.1.1-1.3_s390.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/binary-powerpc/traceroute-nanog_6.1.1-1.3_powerpc.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/binary-mipsel/traceroute-nanog_6.1.1-1.3_mipsel.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/binary-mips/traceroute-nanog_6.1.1-1.3_mips.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/binary-m68k/traceroute-nanog_6.1.1-1.3_m68k.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/binary-ia64/traceroute-nanog_6.1.1-1.3_ia64.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/binary-hppa/traceroute-nanog_6.1.1-1.3_hppa.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/binary-arm/traceroute-nanog_6.1.1-1.3_arm.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/binary-alpha/traceroute-nanog_6.1.1-1.3_alpha.deb
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/main/source/traceroute-nanog_6.1.1-1.3.diff.gz
stable/main/binary-i386/traceroute-nanog_6.1.1-1.3_i386.deb
stable/main/source/traceroute-nanog_6.1.1-1.3.dsc
traceroute-nanog (6.1.1-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Prevent integer overflow with nprobes and max_ttl (CAN-2003-0453)
  * Spray mode still seems buggy, but hopefully not dangerous anymore.  If
    any further bugs are found, it should simply be disabled, as it is a
    mess


stable/contrib/source/tomcat4_4.0.3-3woody3.dsc
stable/contrib/binary-all/libtomcat4-java_4.0.3-3woody3_all.deb
stable/contrib/binary-all/tomcat4_4.0.3-3woody3_all.deb
stable/contrib/binary-all/tomcat4-webapps_4.0.3-3woody3_all.deb
stable/contrib/source/tomcat4_4.0.3-3woody3.diff.gz
tomcat4 (4.0.3-3woody3) stable-security; urgency=high
  * Include a patch from Aldrin Martoq which fixes a DoS attack
    (closes: #215506)
  * Correctly start tomcat4 when booting (closes: #198226)


stable/contrib/source/tomcat_3.3a-4woody1.diff.gz
stable/contrib/binary-i386/libapache-mod-jk_3.3a-4woody1_i386.deb
stable/contrib/source/tomcat_3.3a-4woody1.dsc
stable/contrib/binary-all/tomcat_3.3a-4woody1_all.deb
tomcat (3.3a-4woody1) unstable; urgency=high
  * Include two security fixes from the Tomcat 3.3.1a release:
    + when used with JDK 1.3.1 or earlier, a maliciously crafted request
      could return a directory listing even when an index.html, index.jsp,
      or other welcome file is present. File contents can be returned as well.
    + a malicious web application could read the contents of some files
      outside the web application via its web.xml file in spite of the
      presence of a security manager
  * Disable the examples webapp since it contains cross site scripting
    vulnerability: examples.war is now installed in
    /usr/share/doc/tomcat/examples


stable/main/binary-s390/thttpd-util_2.21b-11.2_s390.deb
stable/main/binary-s390/thttpd_2.21b-11.2_s390.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-powerpc/thttpd-util_2.21b-11.2_powerpc.deb
stable/main/binary-powerpc/thttpd_2.21b-11.2_powerpc.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-mipsel/thttpd_2.21b-11.2_mipsel.deb
stable/main/binary-mipsel/thttpd-util_2.21b-11.2_mipsel.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-mips/thttpd-util_2.21b-11.2_mips.deb
stable/main/binary-mips/thttpd_2.21b-11.2_mips.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-m68k/thttpd_2.21b-11.2_m68k.deb
stable/main/binary-m68k/thttpd-util_2.21b-11.2_m68k.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-ia64/thttpd-util_2.21b-11.2_ia64.deb
stable/main/binary-ia64/thttpd_2.21b-11.2_ia64.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-i386/thttpd_2.21b-11.2_i386.deb
stable/main/binary-i386/thttpd-util_2.21b-11.2_i386.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-hppa/thttpd-util_2.21b-11.2_hppa.deb
stable/main/binary-hppa/thttpd_2.21b-11.2_hppa.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-arm/thttpd-util_2.21b-11.2_arm.deb
stable/main/binary-arm/thttpd_2.21b-11.2_arm.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-alpha/thttpd-util_2.21b-11.2_alpha.deb
stable/main/binary-alpha/thttpd_2.21b-11.2_alpha.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-sparc/thttpd_2.21b-11.2_sparc.deb
stable/main/source/thttpd_2.21b-11.2.diff.gz
stable/main/source/thttpd_2.21b-11.2.dsc
stable/main/binary-sparc/thttpd-util_2.21b-11.2_sparc.deb
thttpd (2.21b-11.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by Jef Poskanzer <jef@acme.com> to fix a remote denial
    of service attack, and possible execution of arbitrary code
    (libhttpd.c, http://www.securityfocus.com/archive/1/342584,
    http://marc.theaimsgroup.com/?l=thttpd&m=106401027904049)


stable/main/binary-sparc/teapop_0.3.4-1woody2_sparc.deb
stable/main/binary-sparc/teapop-mysql_0.3.4-1woody2_sparc.deb
stable/main/binary-sparc/teapop-pgsql_0.3.4-1woody2_sparc.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-s390/teapop-pgsql_0.3.4-1woody2_s390.deb
stable/main/binary-s390/teapop_0.3.4-1woody2_s390.deb
stable/main/binary-s390/teapop-mysql_0.3.4-1woody2_s390.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-powerpc/teapop-pgsql_0.3.4-1woody2_powerpc.deb
stable/main/binary-powerpc/teapop-mysql_0.3.4-1woody2_powerpc.deb
stable/main/binary-powerpc/teapop_0.3.4-1woody2_powerpc.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-mipsel/teapop-pgsql_0.3.4-1woody2_mipsel.deb
stable/main/binary-mipsel/teapop-mysql_0.3.4-1woody2_mipsel.deb
stable/main/binary-mipsel/teapop_0.3.4-1woody2_mipsel.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-mips/teapop-mysql_0.3.4-1woody2_mips.deb
stable/main/binary-mips/teapop_0.3.4-1woody2_mips.deb
stable/main/binary-mips/teapop-pgsql_0.3.4-1woody2_mips.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-m68k/teapop-mysql_0.3.4-1woody2_m68k.deb
stable/main/binary-m68k/teapop_0.3.4-1woody2_m68k.deb
stable/main/binary-m68k/teapop-pgsql_0.3.4-1woody2_m68k.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-ia64/teapop-mysql_0.3.4-1woody2_ia64.deb
stable/main/binary-ia64/teapop-pgsql_0.3.4-1woody2_ia64.deb
stable/main/binary-ia64/teapop_0.3.4-1woody2_ia64.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-hppa/teapop_0.3.4-1woody2_hppa.deb
stable/main/binary-hppa/teapop-pgsql_0.3.4-1woody2_hppa.deb
stable/main/binary-hppa/teapop-mysql_0.3.4-1woody2_hppa.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-arm/teapop_0.3.4-1woody2_arm.deb
stable/main/binary-arm/teapop-mysql_0.3.4-1woody2_arm.deb
stable/main/binary-arm/teapop-pgsql_0.3.4-1woody2_arm.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-alpha/teapop-mysql_0.3.4-1woody2_alpha.deb
stable/main/binary-alpha/teapop-pgsql_0.3.4-1woody2_alpha.deb
stable/main/binary-alpha/teapop_0.3.4-1woody2_alpha.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/source/teapop_0.3.4-1woody2.dsc
stable/main/binary-i386/teapop_0.3.4-1woody2_i386.deb
stable/main/source/teapop_0.3.4-1woody2.diff.gz
stable/main/binary-i386/teapop-mysql_0.3.4-1woody2_i386.deb
stable/main/binary-i386/teapop-pgsql_0.3.4-1woody2_i386.deb
teapop (0.3.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Update config.guess and config.sub to fix build on mips and mipsel
    (how is it that there are mips and mipsel binaries in the archive?)


stable/main/binary-sparc/tcptraceroute_1.2-2_sparc.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-s390/tcptraceroute_1.2-2_s390.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-powerpc/tcptraceroute_1.2-2_powerpc.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-mipsel/tcptraceroute_1.2-2_mipsel.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-mips/tcptraceroute_1.2-2_mips.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-m68k/tcptraceroute_1.2-2_m68k.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-ia64/tcptraceroute_1.2-2_ia64.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-hppa/tcptraceroute_1.2-2_hppa.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-arm/tcptraceroute_1.2-2_arm.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-alpha/tcptraceroute_1.2-2_alpha.deb
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/source/tcptraceroute_1.2-2.diff.gz
stable/main/binary-i386/tcptraceroute_1.2-2_i386.deb
stable/main/source/tcptraceroute_1.2-2.dsc
tcptraceroute (1.2-2) stable-security; urgency=low
  * One-line security fix backported from tcptraceroute 1.4-4
    (See Bug#198142: tcptraceroute: Does not drop root privileges properly)
    No other changes.


stable/main/binary-s390/tcpdump_3.6.2-2.4_s390.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-powerpc/tcpdump_3.6.2-2.4_powerpc.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-mipsel/tcpdump_3.6.2-2.4_mipsel.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-mips/tcpdump_3.6.2-2.4_mips.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-m68k/tcpdump_3.6.2-2.4_m68k.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-ia64/tcpdump_3.6.2-2.4_ia64.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-i386/tcpdump_3.6.2-2.4_i386.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-hppa/tcpdump_3.6.2-2.4_hppa.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-arm/tcpdump_3.6.2-2.4_arm.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-alpha/tcpdump_3.6.2-2.4_alpha.deb
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/source/tcpdump_3.6.2-2.4.diff.gz
stable/main/binary-sparc/tcpdump_3.6.2-2.4_sparc.deb
stable/main/source/tcpdump_3.6.2-2.4.dsc
tcpdump (3.6.2-2.4) stable-security; urgency=low
  * Non-maintainer upload by security team
  * print-radius.c: Fix RADIUS decoder to avoid infinite loops on packets
    (including some valid packets)


stable/main/binary-sparc/sup_1.8-8woody1_sparc.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-s390/sup_1.8-8woody1_s390.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-powerpc/sup_1.8-8woody1_powerpc.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-mipsel/sup_1.8-8woody1_mipsel.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-mips/sup_1.8-8woody1_mips.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-m68k/sup_1.8-8woody1_m68k.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-ia64/sup_1.8-8woody1_ia64.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-hppa/sup_1.8-8woody1_hppa.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-arm/sup_1.8-8woody1_arm.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-alpha/sup_1.8-8woody1_alpha.deb
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/binary-i386/sup_1.8-8woody1_i386.deb
stable/main/source/sup_1.8-8woody1.diff.gz
stable/main/source/sup_1.8-8woody1.dsc
sup (1.8-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jochen Friedrich <jochen@scram.de> to use O_EXCL
    when opening temporary files (CAN-2003-0606)


stable/main/source/squirrelmail_1.2.6-1.3.dsc
stable/main/binary-all/squirrelmail_1.2.6-1.3_all.deb
stable/main/source/squirrelmail_1.2.6-1.3.diff.gz
squirrelmail (1:1.2.6-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed cross site scripting problem in read_body.php (BugTraq ID 6302,
    CAN-2002-1341)


stable/main/binary-sparc/spamassassin_2.20-1woody3_sparc.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-s390/spamassassin_2.20-1woody3_s390.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-powerpc/spamassassin_2.20-1woody3_powerpc.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-mipsel/spamassassin_2.20-1woody3_mipsel.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-mips/spamassassin_2.20-1woody3_mips.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-m68k/spamassassin_2.20-1woody3_m68k.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-ia64/spamassassin_2.20-1woody3_ia64.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-hppa/spamassassin_2.20-1woody3_hppa.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-arm/spamassassin_2.20-1woody3_arm.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-alpha/spamassassin_2.20-1woody3_alpha.deb
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-i386/spamassassin_2.20-1woody3_i386.deb
stable/main/source/spamassassin_2.20-1woody3.diff.gz
stable/main/source/spamassassin_2.20-1woody3.dsc
spamassassin (2.20-1woody3) proposed-updates; urgency=low
  * Unfortunatelly 2.20-1woody2 was not supposed to hit incoming, since it was
    not an RC. This version has the patch unrolled.


stable/main/binary-sparc/snort-common_1.8.4beta1-3.1_sparc.deb
stable/main/binary-sparc/snort_1.8.4beta1-3.1_sparc.deb
stable/main/binary-sparc/snort-mysql_1.8.4beta1-3.1_sparc.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-s390/snort-common_1.8.4beta1-3.1_s390.deb
stable/main/binary-s390/snort-mysql_1.8.4beta1-3.1_s390.deb
stable/main/binary-s390/snort_1.8.4beta1-3.1_s390.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-powerpc/snort-common_1.8.4beta1-3.1_powerpc.deb
stable/main/binary-powerpc/snort_1.8.4beta1-3.1_powerpc.deb
stable/main/binary-powerpc/snort-mysql_1.8.4beta1-3.1_powerpc.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-mipsel/snort-mysql_1.8.4beta1-3.1_mipsel.deb
stable/main/binary-mipsel/snort_1.8.4beta1-3.1_mipsel.deb
stable/main/binary-mipsel/snort-common_1.8.4beta1-3.1_mipsel.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-mips/snort-common_1.8.4beta1-3.1_mips.deb
stable/main/binary-mips/snort-mysql_1.8.4beta1-3.1_mips.deb
stable/main/binary-mips/snort_1.8.4beta1-3.1_mips.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-m68k/snort_1.8.4beta1-3.1_m68k.deb
stable/main/binary-m68k/snort-mysql_1.8.4beta1-3.1_m68k.deb
stable/main/binary-m68k/snort-common_1.8.4beta1-3.1_m68k.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-ia64/snort-mysql_1.8.4beta1-3.1_ia64.deb
stable/main/binary-ia64/snort-common_1.8.4beta1-3.1_ia64.deb
stable/main/binary-ia64/snort_1.8.4beta1-3.1_ia64.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-i386/snort_1.8.4beta1-3.1_i386.deb
stable/main/binary-i386/snort-common_1.8.4beta1-3.1_i386.deb
stable/main/binary-i386/snort-mysql_1.8.4beta1-3.1_i386.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-hppa/snort-common_1.8.4beta1-3.1_hppa.deb
stable/main/binary-hppa/snort_1.8.4beta1-3.1_hppa.deb
stable/main/binary-hppa/snort-mysql_1.8.4beta1-3.1_hppa.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-arm/snort-common_1.8.4beta1-3.1_arm.deb
stable/main/binary-arm/snort-mysql_1.8.4beta1-3.1_arm.deb
stable/main/binary-arm/snort_1.8.4beta1-3.1_arm.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/source/snort_1.8.4beta1-3.1.diff.gz
stable/main/source/snort_1.8.4beta1-3.1.dsc
stable/main/binary-alpha/snort-common_1.8.4beta1-3.1_alpha.deb
stable/main/binary-all/snort-doc_1.8.4beta1-3.1_all.deb
stable/main/binary-all/snort-rules-default_1.8.4beta1-3.1_all.deb
stable/main/binary-alpha/snort-mysql_1.8.4beta1-3.1_alpha.deb
stable/main/binary-alpha/snort_1.8.4beta1-3.1_alpha.deb
snort (1.8.4beta1-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream fix against integer overflow in the stream4
    preprocessor code (VU#139129, CAN-2003-0209, Bugtraq 7178,
    spp_stream4.c)
  * Applied upstream fix against buffer overflow in the RPC preprocessor
    (VU#916785, CAN-2003-0033, Bugtraq 6963, spp_rpc_decode.c)


stable/main/binary-s390/libsnmpkit2_0.9-4.woody.2_s390.deb
stable/main/binary-s390/libsnmpkit-dev_0.9-4.woody.2_s390.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-powerpc/libsnmpkit2_0.9-4.woody.2_powerpc.deb
stable/main/binary-powerpc/libsnmpkit-dev_0.9-4.woody.2_powerpc.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-mipsel/libsnmpkit-dev_0.9-4.woody.2_mipsel.deb
stable/main/binary-mipsel/libsnmpkit2_0.9-4.woody.2_mipsel.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-mips/libsnmpkit2_0.9-4.woody.2_mips.deb
stable/main/binary-mips/libsnmpkit-dev_0.9-4.woody.2_mips.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-m68k/libsnmpkit-dev_0.9-4.woody.2_m68k.deb
stable/main/binary-m68k/libsnmpkit2_0.9-4.woody.2_m68k.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-ia64/libsnmpkit-dev_0.9-4.woody.2_ia64.deb
stable/main/binary-ia64/libsnmpkit2_0.9-4.woody.2_ia64.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-i386/libsnmpkit-dev_0.9-4.woody.2_i386.deb
stable/main/binary-i386/libsnmpkit2_0.9-4.woody.2_i386.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-hppa/libsnmpkit2_0.9-4.woody.2_hppa.deb
stable/main/binary-hppa/libsnmpkit-dev_0.9-4.woody.2_hppa.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-arm/libsnmpkit-dev_0.9-4.woody.2_arm.deb
stable/main/binary-arm/libsnmpkit2_0.9-4.woody.2_arm.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-alpha/libsnmpkit-dev_0.9-4.woody.2_alpha.deb
stable/main/binary-alpha/libsnmpkit2_0.9-4.woody.2_alpha.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/source/snmpkit_0.9-4.woody.2.diff.gz
stable/main/binary-sparc/libsnmpkit2_0.9-4.woody.2_sparc.deb
stable/main/source/snmpkit_0.9-4.woody.2.dsc
stable/main/binary-sparc/libsnmpkit-dev_0.9-4.woody.2_sparc.deb
snmpkit (0.9-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-all/smb2www_980804-16.1_all.deb
stable/main/source/smb2www_980804-16.1.dsc
stable/main/source/smb2www_980804-16.1.diff.gz
smb2www (980804-16.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team, authored by current maintainer
    + wrote the GetCmbOutput() function to fork new process and execute
      commands without using shell.
    + decode input query only in one place (in decode_query()).
  * Thanks to Robert Luberda <robert@debian.org>


stable/main/binary-s390/slocate_2.6-1.3.1_s390.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-powerpc/slocate_2.6-1.3.1_powerpc.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-mipsel/slocate_2.6-1.3.1_mipsel.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-mips/slocate_2.6-1.3.1_mips.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-m68k/slocate_2.6-1.3.1_m68k.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-ia64/slocate_2.6-1.3.1_ia64.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-i386/slocate_2.6-1.3.1_i386.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-hppa/slocate_2.6-1.3.1_hppa.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-arm/slocate_2.6-1.3.1_arm.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-alpha/slocate_2.6-1.3.1_alpha.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/source/slocate_2.6-1.3.1.dsc
stable/main/source/slocate_2.6-1.3.1.diff.gz
stable/main/binary-sparc/slocate_2.6-1.3.1_sparc.deb
slocate (2.6-1.3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows in argument handling, thanks to Kevin Lindsay
    (see CAN-2003-0056)


stable/main/binary-sparc/slashem_0.0.6E4F8-4.0woody3_sparc.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-s390/slashem_0.0.6E4F8-4.0woody3_s390.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-powerpc/slashem_0.0.6E4F8-4.0woody3_powerpc.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-mipsel/slashem_0.0.6E4F8-4.0woody3_mipsel.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-mips/slashem_0.0.6E4F8-4.0woody3_mips.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-m68k/slashem_0.0.6E4F8-4.0woody3_m68k.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-ia64/slashem_0.0.6E4F8-4.0woody3_ia64.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-hppa/slashem_0.0.6E4F8-4.0woody3_hppa.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-arm/slashem_0.0.6E4F8-4.0woody3_arm.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-alpha/slashem_0.0.6E4F8-4.0woody3_alpha.deb
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-i386/slashem_0.0.6E4F8-4.0woody3_i386.deb
stable/main/source/slashem_0.0.6E4F8-4.0woody3.dsc
stable/main/source/slashem_0.0.6E4F8-4.0woody3.diff.gz
slashem (0.0.6E4F8-4.0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target Peter Makholm's upload to proposed-updates to stable-security
    - Fix buffer overflow when displaying high scores [topten.c]


stable/main/binary-sparc/skkserv_10.62a-4woody1_sparc.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-s390/skkserv_10.62a-4woody1_s390.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-powerpc/skkserv_10.62a-4woody1_powerpc.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-mipsel/skkserv_10.62a-4woody1_mipsel.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-mips/skkserv_10.62a-4woody1_mips.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-m68k/skkserv_10.62a-4woody1_m68k.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-ia64/skkserv_10.62a-4woody1_ia64.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-hppa/skkserv_10.62a-4woody1_hppa.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-arm/skkserv_10.62a-4woody1_arm.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-alpha/skkserv_10.62a-4woody1_alpha.deb
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-all/skk_10.62a-4woody1_all.deb
stable/main/source/skk_10.62a-4woody1.dsc
stable/main/binary-i386/skkserv_10.62a-4woody1_i386.deb
stable/main/source/skk_10.62a-4woody1.diff.gz
skk (10.62a-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-all/shorewall_1.2.12-2_all.deb
stable/main/source/shorewall_1.2.12-2.diff.gz
stable/main/source/shorewall_1.2.12-2.dsc
stable/main/binary-all/shorewall-doc_1.2.12-2_all.deb
shorewall (1.2.12-2) stable; urgency=low
  * apply fix for shorewall not applying rate limiting, as defined in
    'shorewall.conf' as 'LOGRATE' and 'LOGBURST', to the rfc1918 logging as it
    does with all other logging.  This has denial of service potential on
    noisy networks. (closes: #206764)
  * dh_installinit is not used anymore to install the init script, it is
    installed by hand to avoid automatically startup and shutdown of the
    firewall during upgrade, install and remove. This should prevent network
    blackouts (closes: #165477)
  * the SUBSYSLOCK variable of shorewall.conf is set to "" because the
    initscript doesn't need it at all (closes: #209023)


stable/main/binary-sparc/sendmail-wide_8.12.3+3.5Wbeta-5.5_sparc.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-s390/sendmail-wide_8.12.3+3.5Wbeta-5.5_s390.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-powerpc/sendmail-wide_8.12.3+3.5Wbeta-5.5_powerpc.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-mipsel/sendmail-wide_8.12.3+3.5Wbeta-5.5_mipsel.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-mips/sendmail-wide_8.12.3+3.5Wbeta-5.5_mips.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-m68k/sendmail-wide_8.12.3+3.5Wbeta-5.5_m68k.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-ia64/sendmail-wide_8.12.3+3.5Wbeta-5.5_ia64.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-hppa/sendmail-wide_8.12.3+3.5Wbeta-5.5_hppa.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-arm/sendmail-wide_8.12.3+3.5Wbeta-5.5_arm.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-alpha/sendmail-wide_8.12.3+3.5Wbeta-5.5_alpha.deb
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/source/sendmail-wide_8.12.3+3.5Wbeta-5.5.dsc
stable/main/binary-i386/sendmail-wide_8.12.3+3.5Wbeta-5.5_i386.deb
stable/main/source/sendmail-wide_8.12.3+3.5Wbeta-5.5.diff.gz
sendmail-wide (8.12.3+3.5Wbeta-5.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from sendmail 8.12.10
    [CAN-2003-0681.patch, CAN-2003-0694.patch]


stable/main/binary-sparc/libmilter-dev_8.12.3-6.6_sparc.deb
stable/main/binary-sparc/sendmail_8.12.3-6.6_sparc.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-s390/sendmail_8.12.3-6.6_s390.deb
stable/main/binary-s390/libmilter-dev_8.12.3-6.6_s390.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-powerpc/libmilter-dev_8.12.3-6.6_powerpc.deb
stable/main/binary-powerpc/sendmail_8.12.3-6.6_powerpc.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-mipsel/sendmail_8.12.3-6.6_mipsel.deb
stable/main/binary-mipsel/libmilter-dev_8.12.3-6.6_mipsel.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-mips/sendmail_8.12.3-6.6_mips.deb
stable/main/binary-mips/libmilter-dev_8.12.3-6.6_mips.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-m68k/libmilter-dev_8.12.3-6.6_m68k.deb
stable/main/binary-m68k/sendmail_8.12.3-6.6_m68k.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-ia64/sendmail_8.12.3-6.6_ia64.deb
stable/main/binary-ia64/libmilter-dev_8.12.3-6.6_ia64.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-hppa/sendmail_8.12.3-6.6_hppa.deb
stable/main/binary-hppa/libmilter-dev_8.12.3-6.6_hppa.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-arm/sendmail_8.12.3-6.6_arm.deb
stable/main/binary-arm/libmilter-dev_8.12.3-6.6_arm.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-alpha/sendmail_8.12.3-6.6_alpha.deb
stable/main/binary-alpha/libmilter-dev_8.12.3-6.6_alpha.deb
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-all/sendmail-doc_8.12.3-6.6_all.deb
stable/main/binary-i386/sendmail_8.12.3-6.6_i386.deb
stable/main/binary-i386/libmilter-dev_8.12.3-6.6_i386.deb
stable/main/source/sendmail_8.12.3-6.6.dsc
stable/main/source/sendmail_8.12.3-6.6.diff.gz
sendmail (8.12.3-6.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerability in ruleset parsing
    [debian/patches/8.12/8.12.3/CAN-2003-0681.patch]


stable/main/binary-all/semi_1.14.3.cvs.2001.08.10-1woody2_all.deb
stable/main/source/semi_1.14.3.cvs.2001.08.10-1woody2.dsc
stable/main/source/semi_1.14.3.cvs.2001.08.10-1woody2.diff.gz
semi (1.14.3.cvs.2001.08.10-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Note CVE assignment in changelog (CAN-2003-0440)
  * No changes


stable/main/binary-sparc/libsane_1.0.7-4_sparc.deb
stable/main/binary-sparc/libsane-dev_1.0.7-4_sparc.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-s390/libsane_1.0.7-4_s390.deb
stable/main/binary-s390/libsane-dev_1.0.7-4_s390.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-powerpc/libsane_1.0.7-4_powerpc.deb
stable/main/binary-powerpc/libsane-dev_1.0.7-4_powerpc.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-mipsel/libsane_1.0.7-4_mipsel.deb
stable/main/binary-mipsel/libsane-dev_1.0.7-4_mipsel.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-mips/libsane_1.0.7-4_mips.deb
stable/main/binary-mips/libsane-dev_1.0.7-4_mips.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-m68k/libsane-dev_1.0.7-4_m68k.deb
stable/main/binary-m68k/libsane_1.0.7-4_m68k.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-ia64/libsane_1.0.7-4_ia64.deb
stable/main/binary-ia64/libsane-dev_1.0.7-4_ia64.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-hppa/libsane_1.0.7-4_hppa.deb
stable/main/binary-hppa/libsane-dev_1.0.7-4_hppa.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-arm/libsane-dev_1.0.7-4_arm.deb
stable/main/binary-arm/libsane_1.0.7-4_arm.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-alpha/libsane-dev_1.0.7-4_alpha.deb
stable/main/binary-alpha/libsane_1.0.7-4_alpha.deb
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-i386/libsane-dev_1.0.7-4_i386.deb
stable/main/source/sane-backends_1.0.7-4.dsc
stable/main/binary-i386/libsane_1.0.7-4_i386.deb
stable/main/source/sane-backends_1.0.7-4.diff.gz
sane-backends (1.0.7-4) stable-security; urgency=high
  * Fixed a possible remotely exploitable bug.


stable/main/binary-s390/swat_2.2.3a-12.3_s390.deb
stable/main/binary-s390/smbclient_2.2.3a-12.3_s390.deb
stable/main/binary-s390/libpam-smbpass_2.2.3a-12.3_s390.deb
stable/main/binary-s390/libsmbclient-dev_2.2.3a-12.3_s390.deb
stable/main/binary-s390/samba-common_2.2.3a-12.3_s390.deb
stable/main/binary-s390/libsmbclient_2.2.3a-12.3_s390.deb
stable/main/binary-s390/samba_2.2.3a-12.3_s390.deb
stable/main/binary-s390/smbfs_2.2.3a-12.3_s390.deb
stable/main/binary-s390/winbind_2.2.3a-12.3_s390.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-powerpc/libpam-smbpass_2.2.3a-12.3_powerpc.deb
stable/main/binary-powerpc/samba-common_2.2.3a-12.3_powerpc.deb
stable/main/binary-powerpc/libsmbclient-dev_2.2.3a-12.3_powerpc.deb
stable/main/binary-powerpc/samba_2.2.3a-12.3_powerpc.deb
stable/main/binary-powerpc/smbfs_2.2.3a-12.3_powerpc.deb
stable/main/binary-powerpc/swat_2.2.3a-12.3_powerpc.deb
stable/main/binary-powerpc/libsmbclient_2.2.3a-12.3_powerpc.deb
stable/main/binary-powerpc/winbind_2.2.3a-12.3_powerpc.deb
stable/main/binary-powerpc/smbclient_2.2.3a-12.3_powerpc.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-mipsel/libsmbclient-dev_2.2.3a-12.3_mipsel.deb
stable/main/binary-mipsel/swat_2.2.3a-12.3_mipsel.deb
stable/main/binary-mipsel/smbclient_2.2.3a-12.3_mipsel.deb
stable/main/binary-mipsel/libsmbclient_2.2.3a-12.3_mipsel.deb
stable/main/binary-mipsel/smbfs_2.2.3a-12.3_mipsel.deb
stable/main/binary-mipsel/libpam-smbpass_2.2.3a-12.3_mipsel.deb
stable/main/binary-mipsel/samba-common_2.2.3a-12.3_mipsel.deb
stable/main/binary-mipsel/samba_2.2.3a-12.3_mipsel.deb
stable/main/binary-mipsel/winbind_2.2.3a-12.3_mipsel.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-mips/swat_2.2.3a-12.3_mips.deb
stable/main/binary-mips/winbind_2.2.3a-12.3_mips.deb
stable/main/binary-mips/samba_2.2.3a-12.3_mips.deb
stable/main/binary-mips/smbclient_2.2.3a-12.3_mips.deb
stable/main/binary-mips/libpam-smbpass_2.2.3a-12.3_mips.deb
stable/main/binary-mips/libsmbclient_2.2.3a-12.3_mips.deb
stable/main/binary-mips/libsmbclient-dev_2.2.3a-12.3_mips.deb
stable/main/binary-mips/smbfs_2.2.3a-12.3_mips.deb
stable/main/binary-mips/samba-common_2.2.3a-12.3_mips.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-m68k/samba-common_2.2.3a-12.3_m68k.deb
stable/main/binary-m68k/samba_2.2.3a-12.3_m68k.deb
stable/main/binary-m68k/libpam-smbpass_2.2.3a-12.3_m68k.deb
stable/main/binary-m68k/winbind_2.2.3a-12.3_m68k.deb
stable/main/binary-m68k/smbclient_2.2.3a-12.3_m68k.deb
stable/main/binary-m68k/libsmbclient-dev_2.2.3a-12.3_m68k.deb
stable/main/binary-m68k/swat_2.2.3a-12.3_m68k.deb
stable/main/binary-m68k/libsmbclient_2.2.3a-12.3_m68k.deb
stable/main/binary-m68k/smbfs_2.2.3a-12.3_m68k.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-ia64/swat_2.2.3a-12.3_ia64.deb
stable/main/binary-ia64/winbind_2.2.3a-12.3_ia64.deb
stable/main/binary-ia64/libpam-smbpass_2.2.3a-12.3_ia64.deb
stable/main/binary-ia64/samba-common_2.2.3a-12.3_ia64.deb
stable/main/binary-ia64/samba_2.2.3a-12.3_ia64.deb
stable/main/binary-ia64/smbclient_2.2.3a-12.3_ia64.deb
stable/main/binary-ia64/libsmbclient-dev_2.2.3a-12.3_ia64.deb
stable/main/binary-ia64/libsmbclient_2.2.3a-12.3_ia64.deb
stable/main/binary-ia64/smbfs_2.2.3a-12.3_ia64.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-i386/libpam-smbpass_2.2.3a-12.3_i386.deb
stable/main/binary-i386/libsmbclient-dev_2.2.3a-12.3_i386.deb
stable/main/binary-i386/smbfs_2.2.3a-12.3_i386.deb
stable/main/binary-i386/libsmbclient_2.2.3a-12.3_i386.deb
stable/main/binary-i386/smbclient_2.2.3a-12.3_i386.deb
stable/main/binary-i386/samba-common_2.2.3a-12.3_i386.deb
stable/main/binary-i386/samba_2.2.3a-12.3_i386.deb
stable/main/binary-i386/winbind_2.2.3a-12.3_i386.deb
stable/main/binary-i386/swat_2.2.3a-12.3_i386.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-hppa/samba_2.2.3a-12.3_hppa.deb
stable/main/binary-hppa/swat_2.2.3a-12.3_hppa.deb
stable/main/binary-hppa/smbfs_2.2.3a-12.3_hppa.deb
stable/main/binary-hppa/samba-common_2.2.3a-12.3_hppa.deb
stable/main/binary-hppa/libpam-smbpass_2.2.3a-12.3_hppa.deb
stable/main/binary-hppa/libsmbclient-dev_2.2.3a-12.3_hppa.deb
stable/main/binary-hppa/winbind_2.2.3a-12.3_hppa.deb
stable/main/binary-hppa/libsmbclient_2.2.3a-12.3_hppa.deb
stable/main/binary-hppa/smbclient_2.2.3a-12.3_hppa.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-arm/samba_2.2.3a-12.3_arm.deb
stable/main/binary-arm/winbind_2.2.3a-12.3_arm.deb
stable/main/binary-arm/smbfs_2.2.3a-12.3_arm.deb
stable/main/binary-arm/libpam-smbpass_2.2.3a-12.3_arm.deb
stable/main/binary-arm/smbclient_2.2.3a-12.3_arm.deb
stable/main/binary-arm/libsmbclient_2.2.3a-12.3_arm.deb
stable/main/binary-arm/libsmbclient-dev_2.2.3a-12.3_arm.deb
stable/main/binary-arm/swat_2.2.3a-12.3_arm.deb
stable/main/binary-arm/samba-common_2.2.3a-12.3_arm.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-alpha/swat_2.2.3a-12.3_alpha.deb
stable/main/binary-alpha/libsmbclient_2.2.3a-12.3_alpha.deb
stable/main/binary-alpha/smbfs_2.2.3a-12.3_alpha.deb
stable/main/binary-alpha/libsmbclient-dev_2.2.3a-12.3_alpha.deb
stable/main/binary-alpha/samba_2.2.3a-12.3_alpha.deb
stable/main/binary-alpha/winbind_2.2.3a-12.3_alpha.deb
stable/main/binary-alpha/smbclient_2.2.3a-12.3_alpha.deb
stable/main/binary-alpha/libpam-smbpass_2.2.3a-12.3_alpha.deb
stable/main/binary-alpha/samba-common_2.2.3a-12.3_alpha.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-sparc/libpam-smbpass_2.2.3a-12.3_sparc.deb
stable/main/binary-sparc/libsmbclient_2.2.3a-12.3_sparc.deb
stable/main/binary-sparc/smbfs_2.2.3a-12.3_sparc.deb
stable/main/source/samba_2.2.3a-12.3.dsc
stable/main/binary-sparc/samba_2.2.3a-12.3_sparc.deb
stable/main/binary-sparc/swat_2.2.3a-12.3_sparc.deb
stable/main/binary-sparc/smbclient_2.2.3a-12.3_sparc.deb
stable/main/binary-sparc/winbind_2.2.3a-12.3_sparc.deb
stable/main/binary-sparc/libsmbclient-dev_2.2.3a-12.3_sparc.deb
stable/main/source/samba_2.2.3a-12.3.diff.gz
stable/main/binary-sparc/samba-common_2.2.3a-12.3_sparc.deb
stable/main/binary-all/samba-doc_2.2.3a-12.3_all.deb
samba (2.2.3a-12.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted patch to most recent bits from the Samba team


stable/main/binary-sparc/radiusd-cistron_1.6.6-1woody1_sparc.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-s390/radiusd-cistron_1.6.6-1woody1_s390.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-powerpc/radiusd-cistron_1.6.6-1woody1_powerpc.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-mipsel/radiusd-cistron_1.6.6-1woody1_mipsel.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-mips/radiusd-cistron_1.6.6-1woody1_mips.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-m68k/radiusd-cistron_1.6.6-1woody1_m68k.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-ia64/radiusd-cistron_1.6.6-1woody1_ia64.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-hppa/radiusd-cistron_1.6.6-1woody1_hppa.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-arm/radiusd-cistron_1.6.6-1woody1_arm.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-alpha/radiusd-cistron_1.6.6-1woody1_alpha.deb
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/source/radiusd-cistron_1.6.6-1woody1.diff.gz
stable/main/binary-i386/radiusd-cistron_1.6.6-1woody1_i386.deb
stable/main/source/radiusd-cistron_1.6.6-1woody1.dsc
radiusd-cistron (1.6.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow involving NAS-Port number (#196063)


stable/main/binary-sparc/libproc-dev_2.0.7-8.woody1_sparc.deb
stable/main/binary-sparc/procps_2.0.7-8.woody1_sparc.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-s390/libproc-dev_2.0.7-8.woody1_s390.deb
stable/main/binary-s390/procps_2.0.7-8.woody1_s390.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-powerpc/libproc-dev_2.0.7-8.woody1_powerpc.deb
stable/main/binary-powerpc/procps_2.0.7-8.woody1_powerpc.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-mipsel/procps_2.0.7-8.woody1_mipsel.deb
stable/main/binary-mipsel/libproc-dev_2.0.7-8.woody1_mipsel.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-mips/libproc-dev_2.0.7-8.woody1_mips.deb
stable/main/binary-mips/procps_2.0.7-8.woody1_mips.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-m68k/procps_2.0.7-8.woody1_m68k.deb
stable/main/binary-m68k/libproc-dev_2.0.7-8.woody1_m68k.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-ia64/procps_2.0.7-8.woody1_ia64.deb
stable/main/binary-ia64/libproc-dev_2.0.7-8.woody1_ia64.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-hppa/libproc-dev_2.0.7-8.woody1_hppa.deb
stable/main/binary-hppa/procps_2.0.7-8.woody1_hppa.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-arm/procps_2.0.7-8.woody1_arm.deb
stable/main/binary-arm/libproc-dev_2.0.7-8.woody1_arm.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-alpha/procps_2.0.7-8.woody1_alpha.deb
stable/main/binary-alpha/libproc-dev_2.0.7-8.woody1_alpha.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/source/procps_2.0.7-8.woody1.dsc
stable/main/source/procps_2.0.7-8.woody1.diff.gz
stable/main/binary-i386/procps_2.0.7-8.woody1_i386.deb
stable/main/binary-i386/libproc-dev_2.0.7-8.woody1_i386.deb
procps (1:2.0.7-8.woody1) stable; urgency=low
  * Fixes ps crash when system.map is exact multiple of 1024
    Exact same patch as for 2.0.7-10
    By happy coincidence Debian ships some kernels that have a
    System.map file that is modulo 1024.
    Thankyou Colin for the patch (again) Closes: #205288, #203982


stable/main/binary-sparc/procmail_3.22-5_sparc.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-s390/procmail_3.22-5_s390.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-powerpc/procmail_3.22-5_powerpc.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-mipsel/procmail_3.22-5_mipsel.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-mips/procmail_3.22-5_mips.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-m68k/procmail_3.22-5_m68k.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-ia64/procmail_3.22-5_ia64.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-hppa/procmail_3.22-5_hppa.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-arm/procmail_3.22-5_arm.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-alpha/procmail_3.22-5_alpha.deb
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/source/procmail_3.22-5.dsc
stable/main/binary-i386/procmail_3.22-5_i386.deb
stable/main/source/procmail_3.22-5.diff.gz
procmail (3.22-5) stable; urgency=medium
  * Patched pipes.c to fix a memory allocation bug (Closes: #171514).


stable/main/binary-s390/pptpd_1.1.2-1.4_s390.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-powerpc/pptpd_1.1.2-1.4_powerpc.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-mipsel/pptpd_1.1.2-1.4_mipsel.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-mips/pptpd_1.1.2-1.4_mips.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-m68k/pptpd_1.1.2-1.4_m68k.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-ia64/pptpd_1.1.2-1.4_ia64.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-i386/pptpd_1.1.2-1.4_i386.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-hppa/pptpd_1.1.2-1.4_hppa.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-arm/pptpd_1.1.2-1.4_arm.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-alpha/pptpd_1.1.2-1.4_alpha.deb
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-sparc/pptpd_1.1.2-1.4_sparc.deb
stable/main/source/pptpd_1.1.2-1.4.dsc
stable/main/source/pptpd_1.1.2-1.4.diff.gz
pptpd (1.1.2-1.4) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch to avoid a buffer overflow (ctrlpacket.c, Bug#189363)


stable/main/binary-sparc/postgresql-client_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/postgresql_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/odbc-postgresql_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/postgresql-dev_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/libpgtcl_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/postgresql-contrib_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/libecpg3_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/libpgperl_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/python-pygresql_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/libpgsql2_7.2.1-2woody4_sparc.deb
stable/main/binary-sparc/pgaccess_7.2.1-2woody4_sparc.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-s390/postgresql-contrib_7.2.1-2woody4_s390.deb
stable/main/binary-s390/libecpg3_7.2.1-2woody4_s390.deb
stable/main/binary-s390/postgresql-dev_7.2.1-2woody4_s390.deb
stable/main/binary-s390/odbc-postgresql_7.2.1-2woody4_s390.deb
stable/main/binary-s390/python-pygresql_7.2.1-2woody4_s390.deb
stable/main/binary-s390/postgresql-client_7.2.1-2woody4_s390.deb
stable/main/binary-s390/libpgtcl_7.2.1-2woody4_s390.deb
stable/main/binary-s390/postgresql_7.2.1-2woody4_s390.deb
stable/main/binary-s390/libpgsql2_7.2.1-2woody4_s390.deb
stable/main/binary-s390/pgaccess_7.2.1-2woody4_s390.deb
stable/main/binary-s390/libpgperl_7.2.1-2woody4_s390.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-powerpc/python-pygresql_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/postgresql-client_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/libpgtcl_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/libpgsql2_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/pgaccess_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/postgresql-contrib_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/libecpg3_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/libpgperl_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/odbc-postgresql_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/postgresql-dev_7.2.1-2woody4_powerpc.deb
stable/main/binary-powerpc/postgresql_7.2.1-2woody4_powerpc.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-mipsel/pgaccess_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/libpgsql2_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/odbc-postgresql_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/postgresql-client_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/postgresql_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/postgresql-contrib_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/libecpg3_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/libpgperl_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/libpgtcl_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/postgresql-dev_7.2.1-2woody4_mipsel.deb
stable/main/binary-mipsel/python-pygresql_7.2.1-2woody4_mipsel.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-mips/postgresql_7.2.1-2woody4_mips.deb
stable/main/binary-mips/libecpg3_7.2.1-2woody4_mips.deb
stable/main/binary-mips/pgaccess_7.2.1-2woody4_mips.deb
stable/main/binary-mips/postgresql-dev_7.2.1-2woody4_mips.deb
stable/main/binary-mips/libpgtcl_7.2.1-2woody4_mips.deb
stable/main/binary-mips/odbc-postgresql_7.2.1-2woody4_mips.deb
stable/main/binary-mips/libpgsql2_7.2.1-2woody4_mips.deb
stable/main/binary-mips/libpgperl_7.2.1-2woody4_mips.deb
stable/main/binary-mips/postgresql-contrib_7.2.1-2woody4_mips.deb
stable/main/binary-mips/postgresql-client_7.2.1-2woody4_mips.deb
stable/main/binary-mips/python-pygresql_7.2.1-2woody4_mips.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-m68k/postgresql_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/postgresql-dev_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/pgaccess_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/postgresql-client_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/python-pygresql_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/libpgperl_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/postgresql-contrib_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/libpgsql2_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/libecpg3_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/odbc-postgresql_7.2.1-2woody4_m68k.deb
stable/main/binary-m68k/libpgtcl_7.2.1-2woody4_m68k.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-ia64/postgresql-dev_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/libecpg3_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/postgresql_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/libpgperl_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/python-pygresql_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/pgaccess_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/odbc-postgresql_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/libpgtcl_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/libpgsql2_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/postgresql-contrib_7.2.1-2woody4_ia64.deb
stable/main/binary-ia64/postgresql-client_7.2.1-2woody4_ia64.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-hppa/postgresql_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/postgresql-dev_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/postgresql-client_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/odbc-postgresql_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/libpgperl_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/python-pygresql_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/libpgsql2_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/pgaccess_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/libpgtcl_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/postgresql-contrib_7.2.1-2woody4_hppa.deb
stable/main/binary-hppa/libecpg3_7.2.1-2woody4_hppa.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-arm/pgaccess_7.2.1-2woody4_arm.deb
stable/main/binary-arm/postgresql_7.2.1-2woody4_arm.deb
stable/main/binary-arm/postgresql-client_7.2.1-2woody4_arm.deb
stable/main/binary-arm/postgresql-dev_7.2.1-2woody4_arm.deb
stable/main/binary-arm/libpgsql2_7.2.1-2woody4_arm.deb
stable/main/binary-arm/libpgtcl_7.2.1-2woody4_arm.deb
stable/main/binary-arm/libecpg3_7.2.1-2woody4_arm.deb
stable/main/binary-arm/postgresql-contrib_7.2.1-2woody4_arm.deb
stable/main/binary-arm/python-pygresql_7.2.1-2woody4_arm.deb
stable/main/binary-arm/odbc-postgresql_7.2.1-2woody4_arm.deb
stable/main/binary-arm/libpgperl_7.2.1-2woody4_arm.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-alpha/pgaccess_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/odbc-postgresql_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/python-pygresql_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/postgresql-dev_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/postgresql-client_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/libpgsql2_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/libpgtcl_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/postgresql_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/postgresql-contrib_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/libpgperl_7.2.1-2woody4_alpha.deb
stable/main/binary-alpha/libecpg3_7.2.1-2woody4_alpha.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-i386/pgaccess_7.2.1-2woody4_i386.deb
stable/main/binary-i386/libpgperl_7.2.1-2woody4_i386.deb
stable/main/binary-i386/postgresql-contrib_7.2.1-2woody4_i386.deb
stable/main/binary-i386/libpgsql2_7.2.1-2woody4_i386.deb
stable/main/binary-i386/python-pygresql_7.2.1-2woody4_i386.deb
stable/main/source/postgresql_7.2.1-2woody4.dsc
stable/main/binary-i386/odbc-postgresql_7.2.1-2woody4_i386.deb
stable/main/binary-i386/libpgtcl_7.2.1-2woody4_i386.deb
stable/main/binary-i386/postgresql-dev_7.2.1-2woody4_i386.deb
stable/main/source/postgresql_7.2.1-2woody4.diff.gz
stable/main/binary-all/postgresql-doc_7.2.1-2woody4_all.deb
stable/main/binary-i386/postgresql-client_7.2.1-2woody4_i386.deb
stable/main/binary-i386/libecpg3_7.2.1-2woody4_i386.deb
stable/main/binary-i386/postgresql_7.2.1-2woody4_i386.deb
postgresql (7.2.1-2woody4) stable-security; urgency=low
  * Updated config/config.{guess,sub} to the recent woody version (building on
    mips fails with the old ones)


stable/main/binary-sparc/postfix-mysql_1.1.11-0.woody3_sparc.deb
stable/main/binary-sparc/postfix-pcre_1.1.11-0.woody3_sparc.deb
stable/main/binary-sparc/postfix-ldap_1.1.11-0.woody3_sparc.deb
stable/main/binary-sparc/postfix_1.1.11-0.woody3_sparc.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-s390/postfix-pcre_1.1.11-0.woody3_s390.deb
stable/main/binary-s390/postfix-mysql_1.1.11-0.woody3_s390.deb
stable/main/binary-s390/postfix_1.1.11-0.woody3_s390.deb
stable/main/binary-s390/postfix-ldap_1.1.11-0.woody3_s390.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-powerpc/postfix-ldap_1.1.11-0.woody3_powerpc.deb
stable/main/binary-powerpc/postfix_1.1.11-0.woody3_powerpc.deb
stable/main/binary-powerpc/postfix-mysql_1.1.11-0.woody3_powerpc.deb
stable/main/binary-powerpc/postfix-pcre_1.1.11-0.woody3_powerpc.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-mipsel/postfix_1.1.11-0.woody3_mipsel.deb
stable/main/binary-mipsel/postfix-ldap_1.1.11-0.woody3_mipsel.deb
stable/main/binary-mipsel/postfix-pcre_1.1.11-0.woody3_mipsel.deb
stable/main/binary-mipsel/postfix-mysql_1.1.11-0.woody3_mipsel.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-mips/postfix_1.1.11-0.woody3_mips.deb
stable/main/binary-mips/postfix-ldap_1.1.11-0.woody3_mips.deb
stable/main/binary-mips/postfix-pcre_1.1.11-0.woody3_mips.deb
stable/main/binary-mips/postfix-mysql_1.1.11-0.woody3_mips.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-m68k/postfix-ldap_1.1.11-0.woody3_m68k.deb
stable/main/binary-m68k/postfix_1.1.11-0.woody3_m68k.deb
stable/main/binary-m68k/postfix-mysql_1.1.11-0.woody3_m68k.deb
stable/main/binary-m68k/postfix-pcre_1.1.11-0.woody3_m68k.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-ia64/postfix-mysql_1.1.11-0.woody3_ia64.deb
stable/main/binary-ia64/postfix_1.1.11-0.woody3_ia64.deb
stable/main/binary-ia64/postfix-ldap_1.1.11-0.woody3_ia64.deb
stable/main/binary-ia64/postfix-pcre_1.1.11-0.woody3_ia64.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-hppa/postfix_1.1.11-0.woody3_hppa.deb
stable/main/binary-hppa/postfix-mysql_1.1.11-0.woody3_hppa.deb
stable/main/binary-hppa/postfix-pcre_1.1.11-0.woody3_hppa.deb
stable/main/binary-hppa/postfix-ldap_1.1.11-0.woody3_hppa.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-arm/postfix_1.1.11-0.woody3_arm.deb
stable/main/binary-arm/postfix-mysql_1.1.11-0.woody3_arm.deb
stable/main/binary-arm/postfix-pcre_1.1.11-0.woody3_arm.deb
stable/main/binary-arm/postfix-ldap_1.1.11-0.woody3_arm.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-alpha/postfix-mysql_1.1.11-0.woody3_alpha.deb
stable/main/binary-alpha/postfix-pcre_1.1.11-0.woody3_alpha.deb
stable/main/binary-alpha/postfix_1.1.11-0.woody3_alpha.deb
stable/main/binary-alpha/postfix-ldap_1.1.11-0.woody3_alpha.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-i386/postfix-pcre_1.1.11-0.woody3_i386.deb
stable/main/binary-i386/postfix-mysql_1.1.11-0.woody3_i386.deb
stable/main/binary-i386/postfix-ldap_1.1.11-0.woody3_i386.deb
stable/main/source/postfix_1.1.11-0.woody3.dsc
stable/main/source/postfix_1.1.11-0.woody3.diff.gz
stable/main/binary-all/postfix-dev_1.1.11-0.woody3_all.deb
stable/main/binary-i386/postfix_1.1.11-0.woody3_i386.deb
stable/main/binary-all/postfix-doc_1.1.11-0.woody3_all.deb
postfix (1.1.11-0.woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Security fixes from postfix 1.1.12 and 1.1.13
    - bounce scanning (CAN-2003-0468)
      [src/trivial-rewrite/resolve.c]
    - malformed address DoS (CAN-2003-0540)
      [src/global/resolve_clnt.c, src/global/resolve_clnt.h,
       src/nqmgr/qmgr_message.c, src/trivial-rewrite/Makefile.in,
       src/trivial-rewrite/resolve.c]


stable/main/binary-all/phpgroupware-brewer_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-admin_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-notes_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-weather_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-core-doc_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-preferences_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-hr_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-phpsysinfo_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-eldaptir_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-chora_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-calendar_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-core_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-filemanager_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-polls_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-phpwebhosting_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-skel_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-dj_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-ftp_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-inv_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-tts_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-img_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-chat_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-registration_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-news-admin_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-addressbook_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-email_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-setup_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-developer-tools_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-nntp_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-phonelog_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-messenger_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-infolog_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-manual_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-headlines_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-stocks_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-xmlrpc_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-bookkeeping_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-comic_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-api_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-bookmarks_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-napster_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-projects_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-todo_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-soap_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-forum_0.9.14-0.RC3.2.woody2_all.deb
stable/main/binary-all/phpgroupware-wap_0.9.14-0.RC3.2.woody2_all.deb
stable/main/source/phpgroupware_0.9.14-0.RC3.2.woody2.dsc
stable/main/source/phpgroupware_0.9.14-0.RC3.2.woody2.diff.gz
stable/main/binary-all/phpgroupware-api-doc_0.9.14-0.RC3.2.woody2_all.deb
phpgroupware (0.9.14-0.RC3.2.woody2) stable-security; urgency=high
  * Security fixes
    - Cross site scripting (CAN-2003-0504),
      see <http://www.security-corporation.com/articles-20030702-005.html>
    - sql insertion (CAN-2003-0657)
    - vfs storage in document dir now prohibited (CAN-2003-0599)
    - Remove $appdir in includes in tables_update.inc.php to prevent
      execution of arbitrary scripts.
    (These are the backports of the security fixes done upstream
    between version 0.9.14.003 and 0.9.14.006, see phpgroupware.org.)
    Closes: #201980.
  * Also: prohibit vfs storage in document dir in the old vfs class
    of filemanager product.


stable/main/binary-sparc/php4-imap_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-gd_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-sybase_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-curl_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-snmp_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-ldap_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-mysql_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-mhash_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-domxml_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-mcal_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-recode_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/caudium-php4_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-odbc_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-xslt_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4-cgi_4.1.2-6woody3_sparc.deb
stable/main/binary-sparc/php4_4.1.2-6woody3_sparc.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-s390/php4-mcal_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-domxml_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-mhash_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-xslt_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-ldap_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-gd_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-sybase_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-mysql_4.1.2-6woody3_s390.deb
stable/main/binary-s390/caudium-php4_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-curl_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-odbc_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-recode_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-snmp_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-imap_4.1.2-6woody3_s390.deb
stable/main/binary-s390/php4-cgi_4.1.2-6woody3_s390.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-powerpc/php4-xslt_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-cgi_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-ldap_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-curl_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-mcal_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-domxml_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-gd_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-recode_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-imap_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-snmp_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-mysql_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-mhash_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-odbc_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/caudium-php4_4.1.2-6woody3_powerpc.deb
stable/main/binary-powerpc/php4-sybase_4.1.2-6woody3_powerpc.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-mipsel/php4-gd_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-sybase_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-domxml_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-ldap_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/caudium-php4_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-cgi_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-mysql_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-curl_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-snmp_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-imap_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-mcal_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-odbc_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-mhash_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-xslt_4.1.2-6woody3_mipsel.deb
stable/main/binary-mipsel/php4-recode_4.1.2-6woody3_mipsel.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-mips/php4-cgi_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-mhash_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-sybase_4.1.2-6woody3_mips.deb
stable/main/binary-mips/caudium-php4_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-gd_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-xslt_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-ldap_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-imap_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-curl_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-domxml_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-mcal_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-odbc_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-recode_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-mysql_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4_4.1.2-6woody3_mips.deb
stable/main/binary-mips/php4-snmp_4.1.2-6woody3_mips.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-m68k/php4-curl_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-mhash_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/caudium-php4_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-mcal_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-mysql_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-domxml_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-recode_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-odbc_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-xslt_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-cgi_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-ldap_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-gd_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-sybase_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-snmp_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4_4.1.2-6woody3_m68k.deb
stable/main/binary-m68k/php4-imap_4.1.2-6woody3_m68k.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-ia64/php4-odbc_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-mhash_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/caudium-php4_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-snmp_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-recode_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-mcal_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-sybase_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-gd_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-curl_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-domxml_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-xslt_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-mysql_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-ldap_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-cgi_4.1.2-6woody3_ia64.deb
stable/main/binary-ia64/php4-imap_4.1.2-6woody3_ia64.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-hppa/php4_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-mcal_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-cgi_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-odbc_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/caudium-php4_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-snmp_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-domxml_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-recode_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-xslt_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-gd_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-ldap_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-mysql_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-sybase_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-curl_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-mhash_4.1.2-6woody3_hppa.deb
stable/main/binary-hppa/php4-imap_4.1.2-6woody3_hppa.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-arm/php4-mhash_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-snmp_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-mcal_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-recode_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-imap_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-domxml_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-xslt_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-sybase_4.1.2-6woody3_arm.deb
stable/main/binary-arm/caudium-php4_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-curl_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-cgi_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-mysql_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-odbc_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-gd_4.1.2-6woody3_arm.deb
stable/main/binary-arm/php4-ldap_4.1.2-6woody3_arm.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-alpha/php4-mcal_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-domxml_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-gd_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-recode_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/caudium-php4_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-xslt_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-ldap_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-cgi_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-sybase_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-odbc_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-mysql_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-snmp_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-mhash_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-curl_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4-imap_4.1.2-6woody3_alpha.deb
stable/main/binary-alpha/php4_4.1.2-6woody3_alpha.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-i386/php4-mysql_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-recode_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-imap_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-snmp_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-cgi_4.1.2-6woody3_i386.deb
stable/main/binary-i386/caudium-php4_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-odbc_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-gd_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-xslt_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-domxml_4.1.2-6woody3_i386.deb
stable/main/binary-all/php4-dev_4.1.2-6woody3_all.deb
stable/main/binary-i386/php4-ldap_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-sybase_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-mcal_4.1.2-6woody3_i386.deb
stable/main/source/php4_4.1.2-6woody3.diff.gz
stable/main/binary-all/php4-pear_4.1.2-6woody3_all.deb
stable/main/source/php4_4.1.2-6woody3.dsc
stable/main/binary-i386/php4-curl_4.1.2-6woody3_i386.deb
stable/main/binary-i386/php4-mhash_4.1.2-6woody3_i386.deb
php4 (4:4.1.2-6woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Changelog correction only
  * The patch added in 4:4.1.2-6woody1 actually fixed CAN-2003-0442.
    Disregard the CAN mentioned in that changelog entry.


stable/main/binary-sparc/perl_5.6.1-8.3_sparc.deb
stable/main/binary-sparc/perl-suid_5.6.1-8.3_sparc.deb
stable/main/binary-sparc/perl-debug_5.6.1-8.3_sparc.deb
stable/main/binary-sparc/perl-base_5.6.1-8.3_sparc.deb
stable/main/binary-sparc/libperl-dev_5.6.1-8.3_sparc.deb
stable/main/binary-sparc/libperl5.6_5.6.1-8.3_sparc.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-s390/perl_5.6.1-8.3_s390.deb
stable/main/binary-s390/perl-base_5.6.1-8.3_s390.deb
stable/main/binary-s390/libperl-dev_5.6.1-8.3_s390.deb
stable/main/binary-s390/perl-suid_5.6.1-8.3_s390.deb
stable/main/binary-s390/libperl5.6_5.6.1-8.3_s390.deb
stable/main/binary-s390/perl-debug_5.6.1-8.3_s390.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-powerpc/perl-suid_5.6.1-8.3_powerpc.deb
stable/main/binary-powerpc/perl-debug_5.6.1-8.3_powerpc.deb
stable/main/binary-powerpc/libperl-dev_5.6.1-8.3_powerpc.deb
stable/main/binary-powerpc/perl_5.6.1-8.3_powerpc.deb
stable/main/binary-powerpc/libperl5.6_5.6.1-8.3_powerpc.deb
stable/main/binary-powerpc/perl-base_5.6.1-8.3_powerpc.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-mipsel/perl-base_5.6.1-8.3_mipsel.deb
stable/main/binary-mipsel/perl-debug_5.6.1-8.3_mipsel.deb
stable/main/binary-mipsel/perl_5.6.1-8.3_mipsel.deb
stable/main/binary-mipsel/libperl5.6_5.6.1-8.3_mipsel.deb
stable/main/binary-mipsel/libperl-dev_5.6.1-8.3_mipsel.deb
stable/main/binary-mipsel/perl-suid_5.6.1-8.3_mipsel.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-mips/perl-debug_5.6.1-8.3_mips.deb
stable/main/binary-mips/libperl5.6_5.6.1-8.3_mips.deb
stable/main/binary-mips/perl_5.6.1-8.3_mips.deb
stable/main/binary-mips/perl-suid_5.6.1-8.3_mips.deb
stable/main/binary-mips/libperl-dev_5.6.1-8.3_mips.deb
stable/main/binary-mips/perl-base_5.6.1-8.3_mips.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-m68k/perl-debug_5.6.1-8.3_m68k.deb
stable/main/binary-m68k/perl-suid_5.6.1-8.3_m68k.deb
stable/main/binary-m68k/perl_5.6.1-8.3_m68k.deb
stable/main/binary-m68k/libperl5.6_5.6.1-8.3_m68k.deb
stable/main/binary-m68k/libperl-dev_5.6.1-8.3_m68k.deb
stable/main/binary-m68k/perl-base_5.6.1-8.3_m68k.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-ia64/libperl5.6_5.6.1-8.3_ia64.deb
stable/main/binary-ia64/perl_5.6.1-8.3_ia64.deb
stable/main/binary-ia64/libperl-dev_5.6.1-8.3_ia64.deb
stable/main/binary-ia64/perl-base_5.6.1-8.3_ia64.deb
stable/main/binary-ia64/perl-suid_5.6.1-8.3_ia64.deb
stable/main/binary-ia64/perl-debug_5.6.1-8.3_ia64.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-hppa/perl-suid_5.6.1-8.3_hppa.deb
stable/main/binary-hppa/libperl-dev_5.6.1-8.3_hppa.deb
stable/main/binary-hppa/libperl5.6_5.6.1-8.3_hppa.deb
stable/main/binary-hppa/perl_5.6.1-8.3_hppa.deb
stable/main/binary-hppa/perl-base_5.6.1-8.3_hppa.deb
stable/main/binary-hppa/perl-debug_5.6.1-8.3_hppa.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-arm/perl-debug_5.6.1-8.3_arm.deb
stable/main/binary-arm/libperl5.6_5.6.1-8.3_arm.deb
stable/main/binary-arm/perl-suid_5.6.1-8.3_arm.deb
stable/main/binary-arm/perl_5.6.1-8.3_arm.deb
stable/main/binary-arm/perl-base_5.6.1-8.3_arm.deb
stable/main/binary-arm/libperl-dev_5.6.1-8.3_arm.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-alpha/perl_5.6.1-8.3_alpha.deb
stable/main/binary-alpha/perl-suid_5.6.1-8.3_alpha.deb
stable/main/binary-alpha/perl-base_5.6.1-8.3_alpha.deb
stable/main/binary-alpha/libperl-dev_5.6.1-8.3_alpha.deb
stable/main/binary-alpha/perl-debug_5.6.1-8.3_alpha.deb
stable/main/binary-alpha/libperl5.6_5.6.1-8.3_alpha.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-i386/perl_5.6.1-8.3_i386.deb
stable/main/source/perl_5.6.1-8.3.diff.gz
stable/main/binary-all/libcgi-fast-perl_5.6.1-8.3_all.deb
stable/main/binary-i386/perl-base_5.6.1-8.3_i386.deb
stable/main/binary-all/perl-modules_5.6.1-8.3_all.deb
stable/main/binary-i386/libperl-dev_5.6.1-8.3_i386.deb
stable/main/binary-all/perl-doc_5.6.1-8.3_all.deb
stable/main/binary-i386/libperl5.6_5.6.1-8.3_i386.deb
stable/main/source/perl_5.6.1-8.3.dsc
stable/main/binary-i386/perl-debug_5.6.1-8.3_i386.deb
stable/main/binary-i386/perl-suid_5.6.1-8.3_i386.deb
perl (5.6.1-8.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to fix cross-site scripting in CGI.pm
    (CAN-2003-0615)
    [debian/patches/19_fix_cgi_xss]


stable/main/binary-powerpc/pcmcia-cs_3.1.33-6woody1_powerpc.deb
pcmcia-cs (3.1.33-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Need pcmcia-cs source in stable-security in order to provide
    updated pcmcia-modules for kernel update.
  * No changes


stable/main/binary-arm/pcmcia-cs_3.1.33-6woody1_arm.deb
pcmcia-cs (3.1.33-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Need pcmcia-cs source in stable-security in order to provide
    updated pcmcia-modules for kernel update.
  * No changes


stable/main/binary-alpha/pcmcia-cs_3.1.33-6woody1_alpha.deb
pcmcia-cs (3.1.33-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Need pcmcia-cs source in stable-security in order to provide
    updated pcmcia-modules for kernel update.
  * No changes


stable/main/source/pcmcia-cs_3.1.33-6woody1.diff.gz
stable/main/binary-i386/pcmcia-cs_3.1.33-6woody1_i386.deb
stable/main/binary-all/pcmcia-source_3.1.33-6woody1_all.deb
stable/main/source/pcmcia-cs_3.1.33-6woody1.dsc
pcmcia-cs (3.1.33-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Need pcmcia-cs source in stable-security in order to provide
    updated pcmcia-modules for kernel update.
  * No changes


stable/main/binary-sparc/orville-write_2.53-4woody1_sparc.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-s390/orville-write_2.53-4woody1_s390.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-powerpc/orville-write_2.53-4woody1_powerpc.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-mipsel/orville-write_2.53-4woody1_mipsel.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-mips/orville-write_2.53-4woody1_mips.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-m68k/orville-write_2.53-4woody1_m68k.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-ia64/orville-write_2.53-4woody1_ia64.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-hppa/orville-write_2.53-4woody1_hppa.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-arm/orville-write_2.53-4woody1_arm.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-alpha/orville-write_2.53-4woody1_alpha.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/source/orville-write_2.53-4woody1.dsc
stable/main/source/orville-write_2.53-4woody1.diff.gz
stable/main/binary-i386/orville-write_2.53-4woody1_i386.deb
orville-write (2.53-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflows when processing environment variables
    (CAN-2003-0441)


stable/main/binary-sparc/ssh-krb5_3.4p1-0woody4_sparc.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-s390/ssh-krb5_3.4p1-0woody4_s390.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-powerpc/ssh-krb5_3.4p1-0woody4_powerpc.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-mipsel/ssh-krb5_3.4p1-0woody4_mipsel.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-mips/ssh-krb5_3.4p1-0woody4_mips.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-m68k/ssh-krb5_3.4p1-0woody4_m68k.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-ia64/ssh-krb5_3.4p1-0woody4_ia64.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-hppa/ssh-krb5_3.4p1-0woody4_hppa.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-arm/ssh-krb5_3.4p1-0woody4_arm.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-alpha/ssh-krb5_3.4p1-0woody4_alpha.deb
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/source/openssh-krb5_3.4p1-0woody4.dsc
stable/main/binary-i386/ssh-krb5_3.4p1-0woody4_i386.deb
stable/main/source/openssh-krb5_3.4p1-0woody4.diff.gz
openssh-krb5 (3.4p1-0woody4) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-sparc/ssh_3.4p1-1.woody.3_sparc.deb
stable/main/binary-sparc/ssh-askpass-gnome_3.4p1-1.woody.3_sparc.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-s390/ssh_3.4p1-1.woody.3_s390.deb
stable/main/binary-s390/ssh-askpass-gnome_3.4p1-1.woody.3_s390.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-powerpc/ssh_3.4p1-1.woody.3_powerpc.deb
stable/main/binary-powerpc/ssh-askpass-gnome_3.4p1-1.woody.3_powerpc.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-mipsel/ssh_3.4p1-1.woody.3_mipsel.deb
stable/main/binary-mipsel/ssh-askpass-gnome_3.4p1-1.woody.3_mipsel.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-mips/ssh_3.4p1-1.woody.3_mips.deb
stable/main/binary-mips/ssh-askpass-gnome_3.4p1-1.woody.3_mips.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-m68k/ssh-askpass-gnome_3.4p1-1.woody.3_m68k.deb
stable/main/binary-m68k/ssh_3.4p1-1.woody.3_m68k.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-ia64/ssh_3.4p1-1.woody.3_ia64.deb
stable/main/binary-ia64/ssh-askpass-gnome_3.4p1-1.woody.3_ia64.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-hppa/ssh_3.4p1-1.woody.3_hppa.deb
stable/main/binary-hppa/ssh-askpass-gnome_3.4p1-1.woody.3_hppa.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-arm/ssh-askpass-gnome_3.4p1-1.woody.3_arm.deb
stable/main/binary-arm/ssh_3.4p1-1.woody.3_arm.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-alpha/ssh-askpass-gnome_3.4p1-1.woody.3_alpha.deb
stable/main/binary-alpha/ssh_3.4p1-1.woody.3_alpha.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-i386/ssh-askpass-gnome_3.4p1-1.woody.3_i386.deb
stable/main/source/openssh_3.4p1-1.woody.3.diff.gz
stable/main/source/openssh_3.4p1-1.woody.3.dsc
stable/main/binary-i386/ssh_3.4p1-1.woody.3_i386.deb
openssh (1:3.4p1-1.woody.3) stable-security; urgency=high
  * NMU by the security team.
  * Apply additional realloc fixes from Solar Designer
  * Apply double-free fix, taken from OpenBSD CVS


stable/main/binary-s390/slapd_2.0.23-6.3_s390.deb
stable/main/binary-s390/ldap-gateways_2.0.23-6.3_s390.deb
stable/main/binary-s390/libldap2-dev_2.0.23-6.3_s390.deb
stable/main/binary-s390/libldap2_2.0.23-6.3_s390.deb
stable/main/binary-s390/ldap-utils_2.0.23-6.3_s390.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-powerpc/libldap2_2.0.23-6.3_powerpc.deb
stable/main/binary-powerpc/libldap2-dev_2.0.23-6.3_powerpc.deb
stable/main/binary-powerpc/ldap-utils_2.0.23-6.3_powerpc.deb
stable/main/binary-powerpc/ldap-gateways_2.0.23-6.3_powerpc.deb
stable/main/binary-powerpc/slapd_2.0.23-6.3_powerpc.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-mipsel/libldap2-dev_2.0.23-6.3_mipsel.deb
stable/main/binary-mipsel/ldap-utils_2.0.23-6.3_mipsel.deb
stable/main/binary-mipsel/ldap-gateways_2.0.23-6.3_mipsel.deb
stable/main/binary-mipsel/slapd_2.0.23-6.3_mipsel.deb
stable/main/binary-mipsel/libldap2_2.0.23-6.3_mipsel.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-mips/slapd_2.0.23-6.3_mips.deb
stable/main/binary-mips/libldap2-dev_2.0.23-6.3_mips.deb
stable/main/binary-mips/ldap-gateways_2.0.23-6.3_mips.deb
stable/main/binary-mips/libldap2_2.0.23-6.3_mips.deb
stable/main/binary-mips/ldap-utils_2.0.23-6.3_mips.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-m68k/slapd_2.0.23-6.3_m68k.deb
stable/main/binary-m68k/ldap-utils_2.0.23-6.3_m68k.deb
stable/main/binary-m68k/libldap2_2.0.23-6.3_m68k.deb
stable/main/binary-m68k/ldap-gateways_2.0.23-6.3_m68k.deb
stable/main/binary-m68k/libldap2-dev_2.0.23-6.3_m68k.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-ia64/libldap2-dev_2.0.23-6.3_ia64.deb
stable/main/binary-ia64/libldap2_2.0.23-6.3_ia64.deb
stable/main/binary-ia64/slapd_2.0.23-6.3_ia64.deb
stable/main/binary-ia64/ldap-utils_2.0.23-6.3_ia64.deb
stable/main/binary-ia64/ldap-gateways_2.0.23-6.3_ia64.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-i386/ldap-utils_2.0.23-6.3_i386.deb
stable/main/binary-i386/ldap-gateways_2.0.23-6.3_i386.deb
stable/main/binary-i386/libldap2-dev_2.0.23-6.3_i386.deb
stable/main/binary-i386/slapd_2.0.23-6.3_i386.deb
stable/main/binary-i386/libldap2_2.0.23-6.3_i386.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-hppa/slapd_2.0.23-6.3_hppa.deb
stable/main/binary-hppa/libldap2_2.0.23-6.3_hppa.deb
stable/main/binary-hppa/ldap-utils_2.0.23-6.3_hppa.deb
stable/main/binary-hppa/libldap2-dev_2.0.23-6.3_hppa.deb
stable/main/binary-hppa/ldap-gateways_2.0.23-6.3_hppa.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-arm/ldap-gateways_2.0.23-6.3_arm.deb
stable/main/binary-arm/slapd_2.0.23-6.3_arm.deb
stable/main/binary-arm/libldap2-dev_2.0.23-6.3_arm.deb
stable/main/binary-arm/ldap-utils_2.0.23-6.3_arm.deb
stable/main/binary-arm/libldap2_2.0.23-6.3_arm.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-alpha/libldap2_2.0.23-6.3_alpha.deb
stable/main/binary-alpha/slapd_2.0.23-6.3_alpha.deb
stable/main/binary-alpha/ldap-gateways_2.0.23-6.3_alpha.deb
stable/main/binary-alpha/libldap2-dev_2.0.23-6.3_alpha.deb
stable/main/binary-alpha/ldap-utils_2.0.23-6.3_alpha.deb
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-sparc/ldap-utils_2.0.23-6.3_sparc.deb
stable/main/source/openldap2_2.0.23-6.3.diff.gz
stable/main/binary-sparc/libldap2_2.0.23-6.3_sparc.deb
stable/main/binary-sparc/ldap-gateways_2.0.23-6.3_sparc.deb
stable/main/binary-sparc/slapd_2.0.23-6.3_sparc.deb
stable/main/binary-sparc/libldap2-dev_2.0.23-6.3_sparc.deb
stable/main/source/openldap2_2.0.23-6.3.dsc
openldap2 (2.0.23-6.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Disabled check for Berkeley DB thread support and enabled support
    unconditionally since a it seems like that check is broken by an
    compiler error on HPPA.


stable/main/binary-s390/omega-rpg_0.90-pa9-7woody1_s390.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-powerpc/omega-rpg_0.90-pa9-7woody1_powerpc.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-mipsel/omega-rpg_0.90-pa9-7woody1_mipsel.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-mips/omega-rpg_0.90-pa9-7woody1_mips.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-m68k/omega-rpg_0.90-pa9-7woody1_m68k.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-ia64/omega-rpg_0.90-pa9-7woody1_ia64.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-i386/omega-rpg_0.90-pa9-7woody1_i386.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-hppa/omega-rpg_0.90-pa9-7woody1_hppa.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-arm/omega-rpg_0.90-pa9-7woody1_arm.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-alpha/omega-rpg_0.90-pa9-7woody1_alpha.deb
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/source/omega-rpg_0.90-pa9-7woody1.diff.gz
stable/main/binary-sparc/omega-rpg_0.90-pa9-7woody1_sparc.deb
stable/main/source/omega-rpg_0.90-pa9-7woody1.dsc
omega-rpg (1:0.90-pa9-7woody1) stable-security; urgency=low
  * Non maintainer upload by The Security Team.
  * Fixed buffer overflow in command line argument handling.
  * Fixed buffer overflows in use of environmental variable usage.


stable/main/binary-sparc/nowebm_2.9a-7.3_sparc.deb
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/binary-s390/nowebm_2.9a-7.3_s390.deb
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/binary-powerpc/nowebm_2.9a-7.3_powerpc.deb
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/binary-mipsel/nowebm_2.9a-7.3_mipsel.deb
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/binary-mips/nowebm_2.9a-7.3_mips.deb
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/binary-m68k/nowebm_2.9a-7.3_m68k.deb
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/binary-hppa/nowebm_2.9a-7.3_hppa.deb
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/binary-arm/nowebm_2.9a-7.3_arm.deb
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/binary-alpha/nowebm_2.9a-7.3_alpha.deb
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/source/noweb_2.9a-7.3.dsc
stable/main/binary-i386/nowebm_2.9a-7.3_i386.deb
stable/main/source/noweb_2.9a-7.3.diff.gz
noweb (2.9a-7.3) stable-security; urgency=high
  * Try to fix build problems on ia64 and hppa using -ffunction-sections


stable/main/binary-s390/node_0.3.0a-2woody1_s390.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-powerpc/node_0.3.0a-2woody1_powerpc.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-mipsel/node_0.3.0a-2woody1_mipsel.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-mips/node_0.3.0a-2woody1_mips.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-m68k/node_0.3.0a-2woody1_m68k.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-ia64/node_0.3.0a-2woody1_ia64.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-i386/node_0.3.0a-2woody1_i386.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-hppa/node_0.3.0a-2woody1_hppa.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-arm/node_0.3.0a-2woody1_arm.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-alpha/node_0.3.0a-2woody1_alpha.deb
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/source/node_0.3.0a-2woody1.diff.gz
stable/main/binary-sparc/node_0.3.0a-2woody1_sparc.deb
stable/main/source/node_0.3.0a-2woody1.dsc
node (0.3.0a-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed buffer overflow in expand_string() (from upstream and SM6TKY)
  * Corrected use of syslog() to fix a potential format string
    vulnerability() (from upstream and SM6TKY)
  * Fixed another format string vulnerability (from upstream and SM6TKY)
  * Thanks to Tomi Manninen <oh2bns@sral.fi>


stable/main/binary-sparc/netris_0.5-4woody1_sparc.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-s390/netris_0.5-4woody1_s390.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-powerpc/netris_0.5-4woody1_powerpc.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-mipsel/netris_0.5-4woody1_mipsel.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-mips/netris_0.5-4woody1_mips.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-m68k/netris_0.5-4woody1_m68k.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-ia64/netris_0.5-4woody1_ia64.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-hppa/netris_0.5-4woody1_hppa.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-arm/netris_0.5-4woody1_arm.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-alpha/netris_0.5-4woody1_alpha.deb
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/source/netris_0.5-4woody1.diff.gz
stable/main/binary-i386/netris_0.5-4woody1_i386.deb
stable/main/source/netris_0.5-4woody1.dsc
netris (0.5-4woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from "Mark H. Weaver" <mhw@netris.org> to fix buffer overflow
    in NetGenFunc (CAN-2003-0685)


stable/main/binary-sparc/libnetpbm9-dev_9.20-8.2_sparc.deb
stable/main/binary-sparc/libnetpbm9_9.20-8.2_sparc.deb
stable/main/binary-sparc/netpbm_9.20-8.2_sparc.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-s390/libnetpbm9-dev_9.20-8.2_s390.deb
stable/main/binary-s390/libnetpbm9_9.20-8.2_s390.deb
stable/main/binary-s390/netpbm_9.20-8.2_s390.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-powerpc/libnetpbm9-dev_9.20-8.2_powerpc.deb
stable/main/binary-powerpc/libnetpbm9_9.20-8.2_powerpc.deb
stable/main/binary-powerpc/netpbm_9.20-8.2_powerpc.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-mipsel/libnetpbm9-dev_9.20-8.2_mipsel.deb
stable/main/binary-mipsel/libnetpbm9_9.20-8.2_mipsel.deb
stable/main/binary-mipsel/netpbm_9.20-8.2_mipsel.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-mips/netpbm_9.20-8.2_mips.deb
stable/main/binary-mips/libnetpbm9_9.20-8.2_mips.deb
stable/main/binary-mips/libnetpbm9-dev_9.20-8.2_mips.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-m68k/netpbm_9.20-8.2_m68k.deb
stable/main/binary-m68k/libnetpbm9-dev_9.20-8.2_m68k.deb
stable/main/binary-m68k/libnetpbm9_9.20-8.2_m68k.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-ia64/netpbm_9.20-8.2_ia64.deb
stable/main/binary-ia64/libnetpbm9_9.20-8.2_ia64.deb
stable/main/binary-ia64/libnetpbm9-dev_9.20-8.2_ia64.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-i386/libnetpbm9-dev_9.20-8.2_i386.deb
stable/main/binary-i386/libnetpbm9_9.20-8.2_i386.deb
stable/main/binary-i386/netpbm_9.20-8.2_i386.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-arm/netpbm_9.20-8.2_arm.deb
stable/main/binary-arm/libnetpbm9_9.20-8.2_arm.deb
stable/main/binary-arm/libnetpbm9-dev_9.20-8.2_arm.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-alpha/netpbm_9.20-8.2_alpha.deb
stable/main/binary-alpha/libnetpbm9_9.20-8.2_alpha.deb
stable/main/binary-alpha/libnetpbm9-dev_9.20-8.2_alpha.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/source/netpbm-free_9.20-8.2.diff.gz
stable/main/binary-hppa/libnetpbm9_9.20-8.2_hppa.deb
stable/main/binary-hppa/netpbm_9.20-8.2_hppa.deb
stable/main/source/netpbm-free_9.20-8.2.dsc
stable/main/binary-hppa/libnetpbm9-dev_9.20-8.2_hppa.deb
netpbm-free (2:9.20-8.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied another patch by Alan Cox


stable/main/binary-sparc/nano_1.0.6-3_sparc.deb
stable/main/binary-sparc/nano-udeb_1.0.6-3_sparc.udeb
stable/main/binary-sparc/nano-tiny_1.0.6-3_sparc.deb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-s390/nano-tiny_1.0.6-3_s390.deb
stable/main/binary-s390/nano-udeb_1.0.6-3_s390.udeb
stable/main/binary-s390/nano_1.0.6-3_s390.deb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-powerpc/nano_1.0.6-3_powerpc.deb
stable/main/binary-powerpc/nano-tiny_1.0.6-3_powerpc.deb
stable/main/binary-powerpc/nano-udeb_1.0.6-3_powerpc.udeb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-mipsel/nano-tiny_1.0.6-3_mipsel.deb
stable/main/binary-mipsel/nano_1.0.6-3_mipsel.deb
stable/main/binary-mipsel/nano-udeb_1.0.6-3_mipsel.udeb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-mips/nano-tiny_1.0.6-3_mips.deb
stable/main/binary-mips/nano_1.0.6-3_mips.deb
stable/main/binary-mips/nano-udeb_1.0.6-3_mips.udeb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-m68k/nano_1.0.6-3_m68k.deb
stable/main/binary-m68k/nano-tiny_1.0.6-3_m68k.deb
stable/main/binary-m68k/nano-udeb_1.0.6-3_m68k.udeb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-ia64/nano-tiny_1.0.6-3_ia64.deb
stable/main/binary-ia64/nano_1.0.6-3_ia64.deb
stable/main/binary-ia64/nano-udeb_1.0.6-3_ia64.udeb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-hppa/nano-udeb_1.0.6-3_hppa.udeb
stable/main/binary-hppa/nano-tiny_1.0.6-3_hppa.deb
stable/main/binary-hppa/nano_1.0.6-3_hppa.deb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-arm/nano-udeb_1.0.6-3_arm.udeb
stable/main/binary-arm/nano-tiny_1.0.6-3_arm.deb
stable/main/binary-arm/nano_1.0.6-3_arm.deb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-alpha/nano-tiny_1.0.6-3_alpha.deb
stable/main/binary-alpha/nano-udeb_1.0.6-3_alpha.udeb
stable/main/binary-alpha/nano_1.0.6-3_alpha.deb
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-i386/nano-udeb_1.0.6-3_i386.udeb
stable/main/source/nano_1.0.6-3.diff.gz
stable/main/binary-i386/nano_1.0.6-3_i386.deb
stable/main/binary-i386/nano-tiny_1.0.6-3_i386.deb
stable/main/source/nano_1.0.6-3.dsc
nano (1.0.6-3) stable; urgency=low
  * nano.c: hardcode a --disable-wrapping-as-root backport to the stable
    version. If, as root, you want to enable wrapping, use the Meta-W toggle
    to enable it after starting nano (fixes: #127634 + 5 more).


stable/main/binary-s390/mutt_1.3.28-2.2_s390.deb
stable/main/binary-s390/mutt-utf8_1.3.28-2.2_s390.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-powerpc/mutt-utf8_1.3.28-2.2_powerpc.deb
stable/main/binary-powerpc/mutt_1.3.28-2.2_powerpc.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-mipsel/mutt-utf8_1.3.28-2.2_mipsel.deb
stable/main/binary-mipsel/mutt_1.3.28-2.2_mipsel.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-mips/mutt_1.3.28-2.2_mips.deb
stable/main/binary-mips/mutt-utf8_1.3.28-2.2_mips.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-m68k/mutt-utf8_1.3.28-2.2_m68k.deb
stable/main/binary-m68k/mutt_1.3.28-2.2_m68k.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-ia64/mutt-utf8_1.3.28-2.2_ia64.deb
stable/main/binary-ia64/mutt_1.3.28-2.2_ia64.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-i386/mutt-utf8_1.3.28-2.2_i386.deb
stable/main/binary-i386/mutt_1.3.28-2.2_i386.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-hppa/mutt_1.3.28-2.2_hppa.deb
stable/main/binary-hppa/mutt-utf8_1.3.28-2.2_hppa.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-arm/mutt_1.3.28-2.2_arm.deb
stable/main/binary-arm/mutt-utf8_1.3.28-2.2_arm.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-alpha/mutt_1.3.28-2.2_alpha.deb
stable/main/binary-alpha/mutt-utf8_1.3.28-2.2_alpha.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/source/mutt_1.3.28-2.2.dsc
stable/main/source/mutt_1.3.28-2.2.diff.gz
stable/main/binary-sparc/mutt-utf8_1.3.28-2.2_sparc.deb
stable/main/binary-sparc/mutt_1.3.28-2.2_sparc.deb
mutt (1.3.28-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed off-by-one buffer overflow in imap/util.c as found by Byrial
    Jensen <byrial@image.dk>


stable/main/binary-sparc/mozart_1.2.3.20011204-3woody1_sparc.deb
stable/main/binary-sparc/mozart-contrib_1.2.3.20011204-3woody1_sparc.deb
mozart (1.2.3.20011204-3woody1) stable-security; urgency=low
  * removed mailcap entry (see #197826) to plug user security hole
  * small changes to compile with stable (thanks to Matt Zimmerman)


stable/main/binary-powerpc/mozart-contrib_1.2.3.20011204-3woody1_powerpc.deb
stable/main/binary-powerpc/mozart_1.2.3.20011204-3woody1_powerpc.deb
mozart (1.2.3.20011204-3woody1) stable-security; urgency=low
  * removed mailcap entry (see #197826) to plug user security hole
  * small changes to compile with stable (thanks to Matt Zimmerman)


stable/main/binary-m68k/mozart_1.2.3.20011204-3woody1_m68k.deb
stable/main/binary-m68k/mozart-contrib_1.2.3.20011204-3woody1_m68k.deb
mozart (1.2.3.20011204-3woody1) stable-security; urgency=low
  * removed mailcap entry (see #197826) to plug user security hole
  * small changes to compile with stable (thanks to Matt Zimmerman)


stable/main/binary-i386/mozart-contrib_1.2.3.20011204-3woody1_i386.deb
stable/main/binary-all/mozart-doc-html_1.2.3.20011204-3woody1_all.deb
stable/main/binary-i386/mozart_1.2.3.20011204-3woody1_i386.deb
stable/main/source/mozart_1.2.3.20011204-3woody1.dsc
stable/main/source/mozart_1.2.3.20011204-3woody1.diff.gz
mozart (1.2.3.20011204-3woody1) stable-security; urgency=low
  * removed mailcap entry (see #197826) to plug user security hole
  * small changes to compile with stable (thanks to Matt Zimmerman)


stable/main/binary-s390/xftp_2.2-18.1_s390.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/binary-powerpc/xftp_2.2-18.1_powerpc.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/binary-mipsel/xftp_2.2-18.1_mipsel.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/binary-mips/xftp_2.2-18.1_mips.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/binary-m68k/xftp_2.2-18.1_m68k.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/binary-ia64/xftp_2.2-18.1_ia64.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/binary-i386/xftp_2.2-18.1_i386.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/binary-hppa/xftp_2.2-18.1_hppa.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/binary-arm/xftp_2.2-18.1_arm.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/binary-alpha/xftp_2.2-18.1_alpha.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/source/moxftp_2.2-18.1.dsc
stable/main/source/moxftp_2.2-18.1.diff.gz
stable/main/binary-sparc/xftp_2.2-18.1_sparc.deb
moxftp (2.2-18.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Erik Tews to fix arbitrary code execution as
    reported by Knud Erik Højgaard.


stable/main/source/minimalist_2.2-4.dsc
stable/main/source/minimalist_2.2-4.diff.gz
stable/main/binary-all/minimalist_2.2-4_all.deb
minimalist (2.2-4) stable-security; urgency=low
  * Added check to getAuth function that prevents remote code execution
    (CVE CAN-2003-0902) (Closes: Bug#218364)


stable/main/source/mindi_0.58.r5-1woody1.dsc
stable/main/binary-i386/mindi_0.58.r5-1woody1_i386.deb
stable/main/source/mindi_0.58.r5-1woody1.diff.gz
mindi (0.58.r5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Jakob.Lell@web.de to create temporary files securely
    (CAN-2003-0617)
    [mindi]


stable/main/source/mime-support_3.18-1.3.dsc
stable/main/binary-all/mime-support_3.18-1.3_all.deb
stable/main/source/mime-support_3.18-1.3.tar.gz
mime-support (3.18-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added patch by Florian Zumbiehl <florz@gmx.de> to fix shell character
    expansion finally.


stable/main/binary-sparc/mikmod_3.1.6-4woody3_sparc.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/binary-s390/mikmod_3.1.6-4woody3_s390.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/binary-powerpc/mikmod_3.1.6-4woody3_powerpc.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/binary-mipsel/mikmod_3.1.6-4woody3_mipsel.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/binary-mips/mikmod_3.1.6-4woody3_mips.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/binary-m68k/mikmod_3.1.6-4woody3_m68k.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/binary-ia64/mikmod_3.1.6-4woody3_ia64.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/binary-hppa/mikmod_3.1.6-4woody3_hppa.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/binary-arm/mikmod_3.1.6-4woody3_arm.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/binary-alpha/mikmod_3.1.6-4woody3_alpha.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/source/mikmod_3.1.6-4woody3.diff.gz
stable/main/source/mikmod_3.1.6-4woody3.dsc
stable/main/binary-i386/mikmod_3.1.6-4woody3_i386.deb
mikmod (3.1.6-4woody3) stable-security; urgency=high
  * Bump version number due to bad upload of potato package to
    stable-security


stable/main/source/mhonarc_2.5.2-1.3.dsc
stable/main/source/mhonarc_2.5.2-1.3.diff.gz
stable/main/binary-all/mhonarc_2.5.2-1.3_all.deb
mhonarc (2.5.2-1.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix another cross site scripting problem


stable/main/binary-s390/mhc-utils_0.25+20010625-7.1_s390.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-powerpc/mhc-utils_0.25+20010625-7.1_powerpc.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-mipsel/mhc-utils_0.25+20010625-7.1_mipsel.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-mips/mhc-utils_0.25+20010625-7.1_mips.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-ia64/mhc-utils_0.25+20010625-7.1_ia64.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-i386/mhc-utils_0.25+20010625-7.1_i386.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-hppa/mhc-utils_0.25+20010625-7.1_hppa.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-arm/mhc-utils_0.25+20010625-7.1_arm.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-alpha/mhc-utils_0.25+20010625-7.1_alpha.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-m68k/mhc-utils_0.25+20010625-7.1_m68k.deb
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/source/mhc_0.25+20010625-7.1.dsc
stable/main/binary-sparc/mhc-utils_0.25+20010625-7.1_sparc.deb
stable/main/binary-all/mhc_0.25+20010625-7.1_all.deb
stable/main/source/mhc_0.25+20010625-7.1.diff.gz
mhc (0.25+20010625-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied a patch to fix predictable temp filename, thanks to Fumitoshi


stable/main/binary-sparc/marbles_1.0.2-1woody1_sparc.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-s390/marbles_1.0.2-1woody1_s390.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-powerpc/marbles_1.0.2-1woody1_powerpc.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-mipsel/marbles_1.0.2-1woody1_mipsel.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-mips/marbles_1.0.2-1woody1_mips.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-m68k/marbles_1.0.2-1woody1_m68k.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-ia64/marbles_1.0.2-1woody1_ia64.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-hppa/marbles_1.0.2-1woody1_hppa.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-arm/marbles_1.0.2-1woody1_arm.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-alpha/marbles_1.0.2-1woody1_alpha.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/source/marbles_1.0.2-1woody1.dsc
stable/main/source/marbles_1.0.2-1woody1.diff.gz
stable/main/binary-i386/marbles_1.0.2-1woody1_i386.deb
marbles (1.0.2-1woody1) stable-security; urgency=high
  * Non maintainer upload by the Security Team
  * Fixed a buffer overflow in handling environmental variables
    (CAN-2003-0830).


stable/main/binary-sparc/man-db_2.3.20-18.woody.4_sparc.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-s390/man-db_2.3.20-18.woody.4_s390.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-powerpc/man-db_2.3.20-18.woody.4_powerpc.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-mipsel/man-db_2.3.20-18.woody.4_mipsel.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-mips/man-db_2.3.20-18.woody.4_mips.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-m68k/man-db_2.3.20-18.woody.4_m68k.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-ia64/man-db_2.3.20-18.woody.4_ia64.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-hppa/man-db_2.3.20-18.woody.4_hppa.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-arm/man-db_2.3.20-18.woody.4_arm.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-alpha/man-db_2.3.20-18.woody.4_alpha.deb
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/source/man-db_2.3.20-18.woody.4.diff.gz
stable/main/binary-i386/man-db_2.3.20-18.woody.4_i386.deb
stable/main/source/man-db_2.3.20-18.woody.4.dsc
man-db (2.3.20-18.woody.4) stable-security; urgency=medium
  * Fix segfault caused by an unchecked strcpy() while resolving hard links
    (closes: #204236).


stable/main/binary-sparc/mah-jong_1.4-2_sparc.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-s390/mah-jong_1.4-2_s390.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-powerpc/mah-jong_1.4-2_powerpc.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-mipsel/mah-jong_1.4-2_mipsel.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-mips/mah-jong_1.4-2_mips.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-m68k/mah-jong_1.4-2_m68k.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-ia64/mah-jong_1.4-2_ia64.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-hppa/mah-jong_1.4-2_hppa.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-arm/mah-jong_1.4-2_arm.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-alpha/mah-jong_1.4-2_alpha.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/source/mah-jong_1.4-2.diff.gz
stable/main/source/mah-jong_1.4-2.dsc
stable/main/binary-i386/mah-jong_1.4-2_i386.deb
mah-jong (1.4-2) stable-security; urgency=high
  * Fix remotely exploitable buffer overflows (CAN-2003-0705).
  * Fix denial of service due to broken handling of escaping (CAN-2003-0706).
  * Fix handling of escaping.
  * Remove useless and potentially dangerous code.
  * New maintainer email.


stable/main/binary-sparc/lyskom-server_2.0.6-1woody1_sparc.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-s390/lyskom-server_2.0.6-1woody1_s390.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-powerpc/lyskom-server_2.0.6-1woody1_powerpc.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-mipsel/lyskom-server_2.0.6-1woody1_mipsel.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-mips/lyskom-server_2.0.6-1woody1_mips.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-m68k/lyskom-server_2.0.6-1woody1_m68k.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-ia64/lyskom-server_2.0.6-1woody1_ia64.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-hppa/lyskom-server_2.0.6-1woody1_hppa.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-arm/lyskom-server_2.0.6-1woody1_arm.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-alpha/lyskom-server_2.0.6-1woody1_alpha.deb
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-i386/lyskom-server_2.0.6-1woody1_i386.deb
stable/main/source/lyskom-server_2.0.6-1woody1.dsc
stable/main/source/lyskom-server_2.0.6-1woody1.diff.gz
lyskom-server (2.0.6-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply upstream patch to fix denial of service
    (lyskom-server-2.0.7-find-next-text-DoS.patch)


stable/main/binary-sparc/lv_4.49.4-7woody2_sparc.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-s390/lv_4.49.4-7woody2_s390.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-powerpc/lv_4.49.4-7woody2_powerpc.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-mipsel/lv_4.49.4-7woody2_mipsel.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-mips/lv_4.49.4-7woody2_mips.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-m68k/lv_4.49.4-7woody2_m68k.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-ia64/lv_4.49.4-7woody2_ia64.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-hppa/lv_4.49.4-7woody2_hppa.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-arm/lv_4.49.4-7woody2_arm.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-alpha/lv_4.49.4-7woody2_alpha.deb
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/source/lv_4.49.4-7woody2.dsc
stable/main/binary-i386/lv_4.49.4-7woody2_i386.deb
stable/main/source/lv_4.49.4-7woody2.diff.gz
lv (4.49.4-7woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not read a configuration file from the current working directory, as it
    could be untrusted, and update documentation to match
  * CAN-2003-0188
  * Bug #190941


stable/main/binary-sparc/lprng_3.8.10-1.2_sparc.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-s390/lprng_3.8.10-1.2_s390.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-powerpc/lprng_3.8.10-1.2_powerpc.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-mipsel/lprng_3.8.10-1.2_mipsel.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-mips/lprng_3.8.10-1.2_mips.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-m68k/lprng_3.8.10-1.2_m68k.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-ia64/lprng_3.8.10-1.2_ia64.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-i386/lprng_3.8.10-1.2_i386.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-hppa/lprng_3.8.10-1.2_hppa.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-arm/lprng_3.8.10-1.2_arm.deb
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/source/lprng_3.8.10-1.2.dsc
stable/main/binary-all/lprng-doc_3.8.10-1.2_all.deb
stable/main/binary-alpha/lprng_3.8.10-1.2_alpha.deb
stable/main/source/lprng_3.8.10-1.2.diff.gz
lprng (3.8.10-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-sparc/liece-dcc_2.0+0.20020217cvs-2.1_sparc.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-s390/liece-dcc_2.0+0.20020217cvs-2.1_s390.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-powerpc/liece-dcc_2.0+0.20020217cvs-2.1_powerpc.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-mipsel/liece-dcc_2.0+0.20020217cvs-2.1_mipsel.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-mips/liece-dcc_2.0+0.20020217cvs-2.1_mips.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-m68k/liece-dcc_2.0+0.20020217cvs-2.1_m68k.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-ia64/liece-dcc_2.0+0.20020217cvs-2.1_ia64.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-hppa/liece-dcc_2.0+0.20020217cvs-2.1_hppa.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-arm/liece-dcc_2.0+0.20020217cvs-2.1_arm.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-alpha/liece-dcc_2.0+0.20020217cvs-2.1_alpha.deb
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-i386/liece-dcc_2.0+0.20020217cvs-2.1_i386.deb
stable/main/binary-all/liece_2.0+0.20020217cvs-2.1_all.deb
stable/main/source/liece_2.0+0.20020217cvs-2.1.dsc
stable/main/source/liece_2.0+0.20020217cvs-2.1.diff.gz
liece (2.0+0.20020217cvs-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from OHASHI Akira <bg66@debian.org> to create temporary files
    safely


stable/main/binary-s390/libprinterconf0_0.5-4.woody.2_s390.deb
stable/main/binary-s390/pconf-detect_0.5-4.woody.2_s390.deb
stable/main/binary-s390/libprinterconf-dev_0.5-4.woody.2_s390.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-powerpc/libprinterconf-dev_0.5-4.woody.2_powerpc.deb
stable/main/binary-powerpc/libprinterconf0_0.5-4.woody.2_powerpc.deb
stable/main/binary-powerpc/pconf-detect_0.5-4.woody.2_powerpc.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-mipsel/libprinterconf0_0.5-4.woody.2_mipsel.deb
stable/main/binary-mipsel/libprinterconf-dev_0.5-4.woody.2_mipsel.deb
stable/main/binary-mipsel/pconf-detect_0.5-4.woody.2_mipsel.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-mips/libprinterconf-dev_0.5-4.woody.2_mips.deb
stable/main/binary-mips/libprinterconf0_0.5-4.woody.2_mips.deb
stable/main/binary-mips/pconf-detect_0.5-4.woody.2_mips.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-m68k/libprinterconf-dev_0.5-4.woody.2_m68k.deb
stable/main/binary-m68k/pconf-detect_0.5-4.woody.2_m68k.deb
stable/main/binary-m68k/libprinterconf0_0.5-4.woody.2_m68k.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-ia64/libprinterconf0_0.5-4.woody.2_ia64.deb
stable/main/binary-ia64/libprinterconf-dev_0.5-4.woody.2_ia64.deb
stable/main/binary-ia64/pconf-detect_0.5-4.woody.2_ia64.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-i386/pconf-detect_0.5-4.woody.2_i386.deb
stable/main/binary-i386/libprinterconf0_0.5-4.woody.2_i386.deb
stable/main/binary-i386/libprinterconf-dev_0.5-4.woody.2_i386.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-hppa/libprinterconf0_0.5-4.woody.2_hppa.deb
stable/main/binary-hppa/pconf-detect_0.5-4.woody.2_hppa.deb
stable/main/binary-hppa/libprinterconf-dev_0.5-4.woody.2_hppa.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-arm/pconf-detect_0.5-4.woody.2_arm.deb
stable/main/binary-arm/libprinterconf0_0.5-4.woody.2_arm.deb
stable/main/binary-arm/libprinterconf-dev_0.5-4.woody.2_arm.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-alpha/pconf-detect_0.5-4.woody.2_alpha.deb
stable/main/binary-alpha/libprinterconf0_0.5-4.woody.2_alpha.deb
stable/main/binary-alpha/libprinterconf-dev_0.5-4.woody.2_alpha.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-sparc/libprinterconf0_0.5-4.woody.2_sparc.deb
stable/main/source/libprinterconf_0.5-4.woody.2.dsc
stable/main/binary-sparc/libprinterconf-dev_0.5-4.woody.2_sparc.deb
stable/main/source/libprinterconf_0.5-4.woody.2.diff.gz
stable/main/binary-sparc/pconf-detect_0.5-4.woody.2_sparc.deb
libprinterconf (0.5-4.woody.2) stable; urgency=medium
  * Rebuilt with binaries this time and a useful distribution
  * No changes made, though


stable/main/binary-s390/libpng3_1.2.1-1.1.woody.3_s390.deb
stable/main/binary-s390/libpng-dev_1.2.1-1.1.woody.3_s390.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-powerpc/libpng3_1.2.1-1.1.woody.3_powerpc.deb
stable/main/binary-powerpc/libpng-dev_1.2.1-1.1.woody.3_powerpc.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-mipsel/libpng3_1.2.1-1.1.woody.3_mipsel.deb
stable/main/binary-mipsel/libpng-dev_1.2.1-1.1.woody.3_mipsel.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-mips/libpng3_1.2.1-1.1.woody.3_mips.deb
stable/main/binary-mips/libpng-dev_1.2.1-1.1.woody.3_mips.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-m68k/libpng-dev_1.2.1-1.1.woody.3_m68k.deb
stable/main/binary-m68k/libpng3_1.2.1-1.1.woody.3_m68k.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-ia64/libpng-dev_1.2.1-1.1.woody.3_ia64.deb
stable/main/binary-ia64/libpng3_1.2.1-1.1.woody.3_ia64.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-i386/libpng-dev_1.2.1-1.1.woody.3_i386.deb
stable/main/binary-i386/libpng3_1.2.1-1.1.woody.3_i386.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-hppa/libpng3_1.2.1-1.1.woody.3_hppa.deb
stable/main/binary-hppa/libpng-dev_1.2.1-1.1.woody.3_hppa.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-arm/libpng3_1.2.1-1.1.woody.3_arm.deb
stable/main/binary-arm/libpng-dev_1.2.1-1.1.woody.3_arm.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-alpha/libpng-dev_1.2.1-1.1.woody.3_alpha.deb
stable/main/binary-alpha/libpng3_1.2.1-1.1.woody.3_alpha.deb
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-sparc/libpng3_1.2.1-1.1.woody.3_sparc.deb
stable/main/source/libpng3_1.2.1-1.1.woody.3.diff.gz
stable/main/binary-sparc/libpng-dev_1.2.1-1.1.woody.3_sparc.deb
stable/main/source/libpng3_1.2.1-1.1.woody.3.dsc
libpng3 (1.2.1-1.1.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-s390/libpng2_1.0.12-3.woody.3_s390.deb
stable/main/binary-s390/libpng2-dev_1.0.12-3.woody.3_s390.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-powerpc/libpng2-dev_1.0.12-3.woody.3_powerpc.deb
stable/main/binary-powerpc/libpng2_1.0.12-3.woody.3_powerpc.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-mipsel/libpng2_1.0.12-3.woody.3_mipsel.deb
stable/main/binary-mipsel/libpng2-dev_1.0.12-3.woody.3_mipsel.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-mips/libpng2_1.0.12-3.woody.3_mips.deb
stable/main/binary-mips/libpng2-dev_1.0.12-3.woody.3_mips.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-m68k/libpng2-dev_1.0.12-3.woody.3_m68k.deb
stable/main/binary-m68k/libpng2_1.0.12-3.woody.3_m68k.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-ia64/libpng2_1.0.12-3.woody.3_ia64.deb
stable/main/binary-ia64/libpng2-dev_1.0.12-3.woody.3_ia64.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-i386/libpng2-dev_1.0.12-3.woody.3_i386.deb
stable/main/binary-i386/libpng2_1.0.12-3.woody.3_i386.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-hppa/libpng2_1.0.12-3.woody.3_hppa.deb
stable/main/binary-hppa/libpng2-dev_1.0.12-3.woody.3_hppa.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-arm/libpng2_1.0.12-3.woody.3_arm.deb
stable/main/binary-arm/libpng2-dev_1.0.12-3.woody.3_arm.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-alpha/libpng2_1.0.12-3.woody.3_alpha.deb
stable/main/binary-alpha/libpng2-dev_1.0.12-3.woody.3_alpha.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/source/libpng_1.0.12-3.woody.3.dsc
stable/main/source/libpng_1.0.12-3.woody.3.diff.gz
stable/main/binary-sparc/libpng2-dev_1.0.12-3.woody.3_sparc.deb
stable/main/binary-sparc/libpng2_1.0.12-3.woody.3_sparc.deb
libpng (1.0.12-3.woody.3) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch to pngrtran.c by Glenn Randers-Pehrson
    <glennrp@comcast.net> to fix a buffer overrun.


stable/main/binary-all/libphp-adodb_1.51-1.1_all.deb
stable/main/source/libphp-adodb_1.51-1.1.dsc
stable/main/source/libphp-adodb_1.51-1.1.diff.gz
libphp-adodb (1.51-1.1) stable; urgency=low
  * Fix GetUpdateSQL() function problem. (Closes: #177332)
    Old function will update all datasets in the table, because the where
    statement wasn't created correctly.
  * Change maintainer name.


stable/main/binary-sparc/libparagui1.0_0.1.0-1_sparc.deb
stable/main/binary-sparc/libparagui1.0-dev_0.1.0-1_sparc.deb
stable/main/binary-sparc/paragui-themes_0.1.0-1_sparc.deb
libparagui1.0 (0.1.0-1) unstable; urgency=low
  * Initial Release (Closes: #109099)
  * added patch that let's paragui-config report /usr/include/paragui-1.0
    as the include directory


stable/main/binary-sparc/libpam-smb_1.1.6-1.1woody1_sparc.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/binary-s390/libpam-smb_1.1.6-1.1woody1_s390.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/binary-powerpc/libpam-smb_1.1.6-1.1woody1_powerpc.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/binary-mipsel/libpam-smb_1.1.6-1.1woody1_mipsel.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/binary-mips/libpam-smb_1.1.6-1.1woody1_mips.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/binary-m68k/libpam-smb_1.1.6-1.1woody1_m68k.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/binary-ia64/libpam-smb_1.1.6-1.1woody1_ia64.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/binary-hppa/libpam-smb_1.1.6-1.1woody1_hppa.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/binary-arm/libpam-smb_1.1.6-1.1woody1_arm.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/binary-alpha/libpam-smb_1.1.6-1.1woody1_alpha.deb
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/source/libpam-smb_1.1.6-1.1woody1.diff.gz
stable/main/binary-i386/libpam-smb_1.1.6-1.1woody1_i386.deb
stable/main/source/libpam-smb_1.1.6-1.1woody1.dsc
libpam-smb (1.1.6-1.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Dave Airlie <airlied@samba.org> to use strncpy rather
    than strcpy
    [pam_smb/smbval/smblib.c]


stable/main/source/libmailtools-perl_1.44-1woody2.dsc
stable/main/binary-all/libmailtools-perl_1.44-1woody2_all.deb
stable/main/binary-all/mailtools_1.44-1woody2_all.deb
stable/main/source/libmailtools-perl_1.44-1woody2.diff.gz
libmailtools-perl (1.44-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove the 'mail' mailer entirely, as it is problematic.  This was the
    approach taken upstream and by other vendors, and as far as I can tell, no
    program specifically requests this buggy type of mailer interface
    (CAN-2002-1271)


stable/main/binary-sparc/liblocale-gettext-perl_1.01-11a.woody_sparc.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-s390/liblocale-gettext-perl_1.01-11a.woody_s390.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-powerpc/liblocale-gettext-perl_1.01-11a.woody_powerpc.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-mipsel/liblocale-gettext-perl_1.01-11a.woody_mipsel.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-mips/liblocale-gettext-perl_1.01-11a.woody_mips.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-m68k/liblocale-gettext-perl_1.01-11a.woody_m68k.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-ia64/liblocale-gettext-perl_1.01-11a.woody_ia64.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-hppa/liblocale-gettext-perl_1.01-11a.woody_hppa.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-arm/liblocale-gettext-perl_1.01-11a.woody_arm.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-alpha/liblocale-gettext-perl_1.01-11a.woody_alpha.deb
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/source/liblocale-gettext-perl_1.01-11a.woody.dsc
stable/main/binary-i386/liblocale-gettext-perl_1.01-11a.woody_i386.deb
stable/main/source/liblocale-gettext-perl_1.01-11a.woody.diff.gz
liblocale-gettext-perl (1.01-11a.woody) stable; urgency=low
  * The bugs #156381 is also in the stable version of the package. Since
    it renders basic packages like debconf unusable when it's installed,
    I'm providing this updated package to fix it.
  * Added the include <libintl.h> in the .xs file this time.
  * Really stupid version number to have a version number lower than
    1.01-11bis which is in unstable...


stable/main/binary-ia64/libdbd-mysql-perl_1.2216-2.0.1_ia64.deb
libdbd-mysql-perl (1.2216-2.0.1) stable; urgency=low
  * Binary-only non-maintainer upload for ia64; no source changes.
  * Rebuild for ia64: Closes: #191552


stable/main/binary-sparc/leksbot_1.2-3.1woody1_sparc.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-s390/leksbot_1.2-3.1woody1_s390.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-powerpc/leksbot_1.2-3.1woody1_powerpc.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-mipsel/leksbot_1.2-3.1woody1_mipsel.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-mips/leksbot_1.2-3.1woody1_mips.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-m68k/leksbot_1.2-3.1woody1_m68k.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-ia64/leksbot_1.2-3.1woody1_ia64.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-hppa/leksbot_1.2-3.1woody1_hppa.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-arm/leksbot_1.2-3.1woody1_arm.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-alpha/leksbot_1.2-3.1woody1_alpha.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/source/leksbot_1.2-3.1woody1.diff.gz
stable/main/source/leksbot_1.2-3.1woody1.dsc
stable/main/binary-i386/leksbot_1.2-3.1woody1_i386.deb
leksbot (1.2-3.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Do not install setuid root (really), and neither make any files
    world-writable


stable/main/binary-s390/krb5-kdc_1.2.4-5woody4_s390.deb
stable/main/binary-s390/libkadm55_1.2.4-5woody4_s390.deb
stable/main/binary-s390/krb5-user_1.2.4-5woody4_s390.deb
stable/main/binary-s390/krb5-telnetd_1.2.4-5woody4_s390.deb
stable/main/binary-s390/libkrb5-dev_1.2.4-5woody4_s390.deb
stable/main/binary-s390/libkrb53_1.2.4-5woody4_s390.deb
stable/main/binary-s390/krb5-rsh-server_1.2.4-5woody4_s390.deb
stable/main/binary-s390/krb5-clients_1.2.4-5woody4_s390.deb
stable/main/binary-s390/krb5-admin-server_1.2.4-5woody4_s390.deb
stable/main/binary-s390/krb5-ftpd_1.2.4-5woody4_s390.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-powerpc/krb5-rsh-server_1.2.4-5woody4_powerpc.deb
stable/main/binary-powerpc/libkrb53_1.2.4-5woody4_powerpc.deb
stable/main/binary-powerpc/krb5-admin-server_1.2.4-5woody4_powerpc.deb
stable/main/binary-powerpc/krb5-user_1.2.4-5woody4_powerpc.deb
stable/main/binary-powerpc/krb5-kdc_1.2.4-5woody4_powerpc.deb
stable/main/binary-powerpc/krb5-ftpd_1.2.4-5woody4_powerpc.deb
stable/main/binary-powerpc/krb5-telnetd_1.2.4-5woody4_powerpc.deb
stable/main/binary-powerpc/libkrb5-dev_1.2.4-5woody4_powerpc.deb
stable/main/binary-powerpc/krb5-clients_1.2.4-5woody4_powerpc.deb
stable/main/binary-powerpc/libkadm55_1.2.4-5woody4_powerpc.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-mipsel/krb5-clients_1.2.4-5woody4_mipsel.deb
stable/main/binary-mipsel/libkadm55_1.2.4-5woody4_mipsel.deb
stable/main/binary-mipsel/libkrb5-dev_1.2.4-5woody4_mipsel.deb
stable/main/binary-mipsel/krb5-kdc_1.2.4-5woody4_mipsel.deb
stable/main/binary-mipsel/krb5-ftpd_1.2.4-5woody4_mipsel.deb
stable/main/binary-mipsel/krb5-user_1.2.4-5woody4_mipsel.deb
stable/main/binary-mipsel/krb5-admin-server_1.2.4-5woody4_mipsel.deb
stable/main/binary-mipsel/krb5-rsh-server_1.2.4-5woody4_mipsel.deb
stable/main/binary-mipsel/libkrb53_1.2.4-5woody4_mipsel.deb
stable/main/binary-mipsel/krb5-telnetd_1.2.4-5woody4_mipsel.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-mips/krb5-rsh-server_1.2.4-5woody4_mips.deb
stable/main/binary-mips/libkrb53_1.2.4-5woody4_mips.deb
stable/main/binary-mips/krb5-kdc_1.2.4-5woody4_mips.deb
stable/main/binary-mips/libkadm55_1.2.4-5woody4_mips.deb
stable/main/binary-mips/krb5-clients_1.2.4-5woody4_mips.deb
stable/main/binary-mips/krb5-telnetd_1.2.4-5woody4_mips.deb
stable/main/binary-mips/krb5-user_1.2.4-5woody4_mips.deb
stable/main/binary-mips/krb5-admin-server_1.2.4-5woody4_mips.deb
stable/main/binary-mips/libkrb5-dev_1.2.4-5woody4_mips.deb
stable/main/binary-mips/krb5-ftpd_1.2.4-5woody4_mips.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-m68k/krb5-user_1.2.4-5woody4_m68k.deb
stable/main/binary-m68k/libkrb53_1.2.4-5woody4_m68k.deb
stable/main/binary-m68k/krb5-rsh-server_1.2.4-5woody4_m68k.deb
stable/main/binary-m68k/krb5-ftpd_1.2.4-5woody4_m68k.deb
stable/main/binary-m68k/libkrb5-dev_1.2.4-5woody4_m68k.deb
stable/main/binary-m68k/krb5-admin-server_1.2.4-5woody4_m68k.deb
stable/main/binary-m68k/krb5-telnetd_1.2.4-5woody4_m68k.deb
stable/main/binary-m68k/krb5-kdc_1.2.4-5woody4_m68k.deb
stable/main/binary-m68k/krb5-clients_1.2.4-5woody4_m68k.deb
stable/main/binary-m68k/libkadm55_1.2.4-5woody4_m68k.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-ia64/libkadm55_1.2.4-5woody4_ia64.deb
stable/main/binary-ia64/libkrb5-dev_1.2.4-5woody4_ia64.deb
stable/main/binary-ia64/krb5-clients_1.2.4-5woody4_ia64.deb
stable/main/binary-ia64/krb5-ftpd_1.2.4-5woody4_ia64.deb
stable/main/binary-ia64/krb5-user_1.2.4-5woody4_ia64.deb
stable/main/binary-ia64/krb5-admin-server_1.2.4-5woody4_ia64.deb
stable/main/binary-ia64/krb5-kdc_1.2.4-5woody4_ia64.deb
stable/main/binary-ia64/krb5-telnetd_1.2.4-5woody4_ia64.deb
stable/main/binary-ia64/libkrb53_1.2.4-5woody4_ia64.deb
stable/main/binary-ia64/krb5-rsh-server_1.2.4-5woody4_ia64.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-i386/krb5-clients_1.2.4-5woody4_i386.deb
stable/main/binary-i386/libkadm55_1.2.4-5woody4_i386.deb
stable/main/binary-i386/krb5-kdc_1.2.4-5woody4_i386.deb
stable/main/binary-i386/krb5-ftpd_1.2.4-5woody4_i386.deb
stable/main/binary-i386/libkrb5-dev_1.2.4-5woody4_i386.deb
stable/main/binary-i386/krb5-admin-server_1.2.4-5woody4_i386.deb
stable/main/binary-i386/krb5-telnetd_1.2.4-5woody4_i386.deb
stable/main/binary-i386/krb5-user_1.2.4-5woody4_i386.deb
stable/main/binary-i386/libkrb53_1.2.4-5woody4_i386.deb
stable/main/binary-i386/krb5-rsh-server_1.2.4-5woody4_i386.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-hppa/krb5-kdc_1.2.4-5woody4_hppa.deb
stable/main/binary-hppa/krb5-admin-server_1.2.4-5woody4_hppa.deb
stable/main/binary-hppa/libkrb53_1.2.4-5woody4_hppa.deb
stable/main/binary-hppa/krb5-user_1.2.4-5woody4_hppa.deb
stable/main/binary-hppa/krb5-rsh-server_1.2.4-5woody4_hppa.deb
stable/main/binary-hppa/krb5-telnetd_1.2.4-5woody4_hppa.deb
stable/main/binary-hppa/libkadm55_1.2.4-5woody4_hppa.deb
stable/main/binary-hppa/libkrb5-dev_1.2.4-5woody4_hppa.deb
stable/main/binary-hppa/krb5-clients_1.2.4-5woody4_hppa.deb
stable/main/binary-hppa/krb5-ftpd_1.2.4-5woody4_hppa.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-arm/krb5-user_1.2.4-5woody4_arm.deb
stable/main/binary-arm/libkrb5-dev_1.2.4-5woody4_arm.deb
stable/main/binary-arm/krb5-clients_1.2.4-5woody4_arm.deb
stable/main/binary-arm/libkadm55_1.2.4-5woody4_arm.deb
stable/main/binary-arm/libkrb53_1.2.4-5woody4_arm.deb
stable/main/binary-arm/krb5-rsh-server_1.2.4-5woody4_arm.deb
stable/main/binary-arm/krb5-admin-server_1.2.4-5woody4_arm.deb
stable/main/binary-arm/krb5-kdc_1.2.4-5woody4_arm.deb
stable/main/binary-arm/krb5-telnetd_1.2.4-5woody4_arm.deb
stable/main/binary-arm/krb5-ftpd_1.2.4-5woody4_arm.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-alpha/krb5-admin-server_1.2.4-5woody4_alpha.deb
stable/main/binary-alpha/libkadm55_1.2.4-5woody4_alpha.deb
stable/main/binary-alpha/krb5-rsh-server_1.2.4-5woody4_alpha.deb
stable/main/binary-alpha/libkrb53_1.2.4-5woody4_alpha.deb
stable/main/binary-alpha/krb5-clients_1.2.4-5woody4_alpha.deb
stable/main/binary-alpha/libkrb5-dev_1.2.4-5woody4_alpha.deb
stable/main/binary-alpha/krb5-user_1.2.4-5woody4_alpha.deb
stable/main/binary-alpha/krb5-telnetd_1.2.4-5woody4_alpha.deb
stable/main/binary-alpha/krb5-kdc_1.2.4-5woody4_alpha.deb
stable/main/binary-alpha/krb5-ftpd_1.2.4-5woody4_alpha.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-sparc/krb5-ftpd_1.2.4-5woody4_sparc.deb
stable/main/source/krb5_1.2.4-5woody4.dsc
stable/main/binary-sparc/libkrb5-dev_1.2.4-5woody4_sparc.deb
stable/main/binary-all/krb5-doc_1.2.4-5woody4_all.deb
stable/main/binary-sparc/krb5-rsh-server_1.2.4-5woody4_sparc.deb
stable/main/binary-sparc/krb5-admin-server_1.2.4-5woody4_sparc.deb
stable/main/binary-sparc/krb5-kdc_1.2.4-5woody4_sparc.deb
stable/main/binary-sparc/krb5-telnetd_1.2.4-5woody4_sparc.deb
stable/main/binary-sparc/krb5-clients_1.2.4-5woody4_sparc.deb
stable/main/binary-sparc/krb5-user_1.2.4-5woody4_sparc.deb
stable/main/binary-sparc/libkrb53_1.2.4-5woody4_sparc.deb
stable/main/source/krb5_1.2.4-5woody4.diff.gz
stable/main/binary-sparc/libkadm55_1.2.4-5woody4_sparc.deb
krb5 (1.2.4-5woody4) stable-security; urgency=high
  * Patch for CERT VU#623217 and VU#442569: Cryptographic weaknesses in
    Kerberos 4
     - Add -X option to krb5kdc and krb524d.  By default  cross-realm is
       no longer supported for krb4 as it is a security hole.
     - Add protection to isolate krb5 keys from krb4 especially for the
       TGS key
     - Remove support for the MIT extension to krb4 to use 3DES keys as it
       is insecure.
  * Patch to various DOS issues where the KDC assumes principal names have
    certain components.  Fixes CAN-2003-0072
  * Patch for CERT VU#516825: Additional errors in XDR that may lead to
    denial of service.


stable/main/binary-all/kernel-doc-2.4.18_2.4.18-13_all.deb
stable/main/source/kernel-source-2.4.18_2.4.18-13.diff.gz
stable/main/binary-all/kernel-source-2.4.18_2.4.18-13_all.deb
stable/main/source/kernel-source-2.4.18_2.4.18-13.dsc
kernel-source-2.4.18 (2.4.18-13) stable-security; urgency=high
  * Fixed steal_locks race introduced in 2.4.18-10:
    . fs/binfmt_elf.c
    . fs/exec.c


stable/main/binary-sparc/mkcramfs_2.4.17-1woody1_sparc.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-s390/mkcramfs_2.4.17-1woody1_s390.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-powerpc/mkcramfs_2.4.17-1woody1_powerpc.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-mipsel/mkcramfs_2.4.17-1woody1_mipsel.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-mips/mkcramfs_2.4.17-1woody1_mips.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-m68k/mkcramfs_2.4.17-1woody1_m68k.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-ia64/mkcramfs_2.4.17-1woody1_ia64.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-hppa/mkcramfs_2.4.17-1woody1_hppa.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-arm/mkcramfs_2.4.17-1woody1_arm.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-alpha/mkcramfs_2.4.17-1woody1_alpha.deb
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-all/kernel-doc-2.4.17_2.4.17-1woody1_all.deb
stable/main/binary-all/kernel-source-2.4.17_2.4.17-1woody1_all.deb
stable/main/source/kernel-source-2.4.17_2.4.17-1woody1.dsc
stable/main/binary-i386/mkcramfs_2.4.17-1woody1_i386.deb
stable/main/source/kernel-source-2.4.17_2.4.17-1woody1.diff.gz
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply security fixes from 2.4.18-9
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions


stable/main/binary-mips/mips-tools_2.4.19-0.020911.1.woody1_mips.deb
stable/main/binary-all/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody1_all.deb
stable/main/binary-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody1_mips.deb
stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody1.tar.gz
stable/main/binary-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody1_mips.deb
stable/main/binary-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody1_mips.deb
stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody1.dsc
kernel-patch-2.4.19-mips (2.4.19-0.020911.1.woody1) stable-security; urgency=high
  * fix ptrace security hole


stable/main/binary-powerpc/kernel-image-2.4.18-powerpc-smp_2.4.18-1woody1_powerpc.deb
stable/main/binary-powerpc/kernel-image-2.4.18-newpmac_2.4.18-1woody1_powerpc.deb
stable/main/binary-powerpc/kernel-image-2.4.18-powerpc_2.4.18-1woody1_powerpc.deb
stable/main/source/kernel-patch-2.4.18-powerpc_2.4.18-1woody1.tar.gz
stable/main/binary-powerpc/kernel-headers-2.4.18_2.4.18-1woody1_powerpc.deb
stable/main/binary-all/kernel-patch-2.4.18-powerpc_2.4.18-1woody1_all.deb
stable/main/source/kernel-patch-2.4.18-powerpc_2.4.18-1woody1.dsc
kernel-patch-2.4.18-powerpc (2.4.18-1woody1) stable; urgency=high
  * Build against kernel-source-2.4.18 version 2.4.18-9 to pick up
    security fixes.
  * Backport change from unstable to disable CMD640 support - fixes some
    boot failures.


stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.1.dsc
stable/main/binary-all/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.1_all.deb
stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.1.diff.gz
kernel-patch-2.4.17-s390 (0.0.20020816-0.woody.1.1) stable-security; urgency=high
  * NMU
  * Added an s390 specific patch for the ptrace vulnerability,
    provided by Martin Schwidefsky <schwidefsky@de.ibm.com>.


stable/main/binary-mipsel/kernel-headers-2.4.17_2.4.17-0.020226.2.woody2_mipsel.deb
stable/main/binary-mipsel/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody2_mipsel.deb
stable/main/binary-mipsel/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody2_mipsel.deb
stable/main/binary-mipsel/mips-tools_2.4.17-0.020226.2.woody2_mipsel.deb
kernel-patch-2.4.17-mips (2.4.17-0.020226.2.woody2) stable-security; urgency=low
  * backout our ptrace fix since this is fixed in kernel-source-2.4.17-1woody1
  * Rebuilt against new kernel-source-2.4.17-1woody1 which fixes:
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions
  * remove Readme.Debian from the diff


stable/main/binary-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody2_mips.deb
stable/main/binary-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody2_mips.deb
stable/main/binary-all/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2_all.deb
stable/main/source/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2.dsc
stable/main/binary-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody2_mips.deb
stable/main/source/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2.tar.gz
kernel-patch-2.4.17-mips (2.4.17-0.020226.2.woody2) stable-security; urgency=low
  * backout our ptrace fix since this is fixed in kernel-source-2.4.17-1woody1
  * Rebuilt against new kernel-source-2.4.17-1woody1 which fixes:
    - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
      drivers do not pad frames with null bytes, which allows remote
      attackers to obtain information from previous packets or kernel
      memory by using malformed packets
    - CAN-2003-0127: The kernel module loader allows local users to gain
      root privileges by using ptrace to attach to a child process that
      is spawned by the kernel
    - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
      Netfilter IP conntrack module, allows remote attackers to cause a
      denial of service (CPU consumption) via packets with forged
      source addresses that cause a large number of hash table
      collisions related to the PREROUTING chain
    - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
      does not properly restrict privileges, which allows local users to
      gain read or write access to certain I/O ports.
    - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
      kernels 2.4.18 and earlier on x86 systems allow local users to kill
      arbitrary processes via a a binary compatibility interface (lcall)
    - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
      modify CPU state registers via a malformed address.
    - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
      allows attackers to cause a denial of service ("kernel oops")
    - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
      kernel 2.4 allows remote attackers to cause a denial of service (CPU
      consumption) via certain packets that cause a large number of hash
      table collisions
  * remove Readme.Debian from the diff


stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.2.2.dsc
stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.2.2.tar.gz
stable/main/binary-s390/kernel-headers-2.4.17_2.4.17-2.woody.2.2_s390.deb
stable/main/binary-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.2.2_s390.deb
kernel-image-2.4.17-s390 (2.4.17-2.woody.2.2) stable-security; urgency=high
  * NMU
  * revert accidental configuration changes


stable/main/source/kernel-image-2.2.20-i386_2.2.20-5woody3.tar.gz
stable/main/binary-i386/kernel-image-2.2.20-idepci_2.2.20-5woody3_i386.deb
stable/main/binary-i386/kernel-headers-2.2.20-idepci_2.2.20-5woody3_i386.deb
stable/main/binary-i386/kernel-image-2.2.20_2.2.20-5woody3_i386.deb
stable/main/binary-i386/kernel-headers-2.2.20-compact_2.2.20-5woody3_i386.deb
stable/main/binary-i386/kernel-image-2.2.20-compact_2.2.20-5woody3_i386.deb
stable/main/binary-i386/kernel-headers-2.2.20_2.2.20-5woody3_i386.deb
stable/main/source/kernel-image-2.2.20-i386_2.2.20-5woody3.dsc
kernel-image-2.2.20-i386 (2.2.20-5woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Rebuild with pcmcia-cs from stable-security so that katie ACCEPTs us


stable/main/binary-sparc/kmtrace_2.2.2-3.2_sparc.deb
stable/main/binary-sparc/kbabel_2.2.2-3.2_sparc.deb
stable/main/binary-sparc/kbabel-dev_2.2.2-3.2_sparc.deb
stable/main/binary-sparc/kspy_2.2.2-3.2_sparc.deb
stable/main/binary-sparc/kdesdk_2.2.2-3.2_sparc.deb
stable/main/binary-sparc/poxml_2.2.2-3.2_sparc.deb
stable/main/binary-sparc/kstartperf_2.2.2-3.2_sparc.deb
stable/main/binary-sparc/kexample_2.2.2-3.2_sparc.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-s390/kbabel_2.2.2-3.2_s390.deb
stable/main/binary-s390/kdesdk_2.2.2-3.2_s390.deb
stable/main/binary-s390/kmtrace_2.2.2-3.2_s390.deb
stable/main/binary-s390/kspy_2.2.2-3.2_s390.deb
stable/main/binary-s390/kstartperf_2.2.2-3.2_s390.deb
stable/main/binary-s390/kexample_2.2.2-3.2_s390.deb
stable/main/binary-s390/poxml_2.2.2-3.2_s390.deb
stable/main/binary-s390/kbabel-dev_2.2.2-3.2_s390.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-powerpc/kbabel-dev_2.2.2-3.2_powerpc.deb
stable/main/binary-powerpc/kdesdk_2.2.2-3.2_powerpc.deb
stable/main/binary-powerpc/kstartperf_2.2.2-3.2_powerpc.deb
stable/main/binary-powerpc/kspy_2.2.2-3.2_powerpc.deb
stable/main/binary-powerpc/kbabel_2.2.2-3.2_powerpc.deb
stable/main/binary-powerpc/poxml_2.2.2-3.2_powerpc.deb
stable/main/binary-powerpc/kmtrace_2.2.2-3.2_powerpc.deb
stable/main/binary-powerpc/kexample_2.2.2-3.2_powerpc.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mipsel/kexample_2.2.2-3.2_mipsel.deb
stable/main/binary-mipsel/kmtrace_2.2.2-3.2_mipsel.deb
stable/main/binary-mipsel/kbabel-dev_2.2.2-3.2_mipsel.deb
stable/main/binary-mipsel/kstartperf_2.2.2-3.2_mipsel.deb
stable/main/binary-mipsel/kbabel_2.2.2-3.2_mipsel.deb
stable/main/binary-mipsel/kspy_2.2.2-3.2_mipsel.deb
stable/main/binary-mipsel/poxml_2.2.2-3.2_mipsel.deb
stable/main/binary-mipsel/kdesdk_2.2.2-3.2_mipsel.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mips/poxml_2.2.2-3.2_mips.deb
stable/main/binary-mips/kbabel-dev_2.2.2-3.2_mips.deb
stable/main/binary-mips/kmtrace_2.2.2-3.2_mips.deb
stable/main/binary-mips/kspy_2.2.2-3.2_mips.deb
stable/main/binary-mips/kbabel_2.2.2-3.2_mips.deb
stable/main/binary-mips/kexample_2.2.2-3.2_mips.deb
stable/main/binary-mips/kdesdk_2.2.2-3.2_mips.deb
stable/main/binary-mips/kstartperf_2.2.2-3.2_mips.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-m68k/kbabel-dev_2.2.2-3.2_m68k.deb
stable/main/binary-m68k/poxml_2.2.2-3.2_m68k.deb
stable/main/binary-m68k/kmtrace_2.2.2-3.2_m68k.deb
stable/main/binary-m68k/kexample_2.2.2-3.2_m68k.deb
stable/main/binary-m68k/kbabel_2.2.2-3.2_m68k.deb
stable/main/binary-m68k/kstartperf_2.2.2-3.2_m68k.deb
stable/main/binary-m68k/kspy_2.2.2-3.2_m68k.deb
stable/main/binary-m68k/kdesdk_2.2.2-3.2_m68k.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-ia64/kdesdk_2.2.2-3.2_ia64.deb
stable/main/binary-ia64/kspy_2.2.2-3.2_ia64.deb
stable/main/binary-ia64/kmtrace_2.2.2-3.2_ia64.deb
stable/main/binary-ia64/kexample_2.2.2-3.2_ia64.deb
stable/main/binary-ia64/kbabel_2.2.2-3.2_ia64.deb
stable/main/binary-ia64/poxml_2.2.2-3.2_ia64.deb
stable/main/binary-ia64/kbabel-dev_2.2.2-3.2_ia64.deb
stable/main/binary-ia64/kstartperf_2.2.2-3.2_ia64.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-i386/kstartperf_2.2.2-3.2_i386.deb
stable/main/binary-i386/kspy_2.2.2-3.2_i386.deb
stable/main/binary-i386/kbabel_2.2.2-3.2_i386.deb
stable/main/binary-i386/kdesdk_2.2.2-3.2_i386.deb
stable/main/binary-i386/kexample_2.2.2-3.2_i386.deb
stable/main/binary-i386/kmtrace_2.2.2-3.2_i386.deb
stable/main/binary-i386/kbabel-dev_2.2.2-3.2_i386.deb
stable/main/binary-i386/poxml_2.2.2-3.2_i386.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-arm/kstartperf_2.2.2-3.2_arm.deb
stable/main/binary-arm/kspy_2.2.2-3.2_arm.deb
stable/main/binary-arm/kmtrace_2.2.2-3.2_arm.deb
stable/main/binary-arm/kdesdk_2.2.2-3.2_arm.deb
stable/main/binary-arm/poxml_2.2.2-3.2_arm.deb
stable/main/binary-arm/kbabel-dev_2.2.2-3.2_arm.deb
stable/main/binary-arm/kbabel_2.2.2-3.2_arm.deb
stable/main/binary-arm/kexample_2.2.2-3.2_arm.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-alpha/poxml_2.2.2-3.2_alpha.deb
stable/main/binary-alpha/kbabel_2.2.2-3.2_alpha.deb
stable/main/binary-alpha/kmtrace_2.2.2-3.2_alpha.deb
stable/main/binary-alpha/kstartperf_2.2.2-3.2_alpha.deb
stable/main/binary-alpha/kexample_2.2.2-3.2_alpha.deb
stable/main/binary-alpha/kdesdk_2.2.2-3.2_alpha.deb
stable/main/binary-alpha/kbabel-dev_2.2.2-3.2_alpha.deb
stable/main/binary-alpha/kspy_2.2.2-3.2_alpha.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-hppa/poxml_2.2.2-3.2_hppa.deb
stable/main/binary-hppa/kexample_2.2.2-3.2_hppa.deb
stable/main/binary-all/kdesdk-scripts_2.2.2-3.2_all.deb
stable/main/binary-hppa/kdesdk_2.2.2-3.2_hppa.deb
stable/main/binary-hppa/kbabel_2.2.2-3.2_hppa.deb
stable/main/source/kdesdk_2.2.2-3.2.dsc
stable/main/binary-hppa/kstartperf_2.2.2-3.2_hppa.deb
stable/main/binary-hppa/kbabel-dev_2.2.2-3.2_hppa.deb
stable/main/binary-all/kdepalettes_2.2.2-3.2_all.deb
stable/main/binary-hppa/kmtrace_2.2.2-3.2_hppa.deb
stable/main/binary-hppa/kspy_2.2.2-3.2_hppa.deb
stable/main/source/kdesdk_2.2.2-3.2.diff.gz
stable/main/binary-all/kapptemplate_2.2.2-3.2_all.deb
stable/main/binary-all/kdesdk-doc_2.2.2-3.2_all.deb
kdesdk (2.2.2-3.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-sparc/kmail_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/klisa_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/libmimelib-dev_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/libkdenetwork1_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/korn_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/knewsticker_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/knode_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/libmimelib1_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/ksirc_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/ktalkd_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/kit_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/kdict_2.2.2-14.6_sparc.deb
stable/main/binary-sparc/kppp_2.2.2-14.6_sparc.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-s390/kit_2.2.2-14.6_s390.deb
stable/main/binary-s390/libmimelib-dev_2.2.2-14.6_s390.deb
stable/main/binary-s390/klisa_2.2.2-14.6_s390.deb
stable/main/binary-s390/kdict_2.2.2-14.6_s390.deb
stable/main/binary-s390/ksirc_2.2.2-14.6_s390.deb
stable/main/binary-s390/korn_2.2.2-14.6_s390.deb
stable/main/binary-s390/kppp_2.2.2-14.6_s390.deb
stable/main/binary-s390/knode_2.2.2-14.6_s390.deb
stable/main/binary-s390/libmimelib1_2.2.2-14.6_s390.deb
stable/main/binary-s390/libkdenetwork1_2.2.2-14.6_s390.deb
stable/main/binary-s390/kmail_2.2.2-14.6_s390.deb
stable/main/binary-s390/knewsticker_2.2.2-14.6_s390.deb
stable/main/binary-s390/ktalkd_2.2.2-14.6_s390.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-powerpc/ksirc_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/libmimelib1_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/kdict_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/korn_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/kmail_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/knode_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/ktalkd_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/klisa_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/knewsticker_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/libmimelib-dev_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/libkdenetwork1_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/kit_2.2.2-14.6_powerpc.deb
stable/main/binary-powerpc/kppp_2.2.2-14.6_powerpc.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-mipsel/kdict_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/libmimelib-dev_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/ksirc_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/libmimelib1_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/klisa_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/kppp_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/korn_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/kit_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/libkdenetwork1_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/kmail_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/knewsticker_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/knode_2.2.2-14.6_mipsel.deb
stable/main/binary-mipsel/ktalkd_2.2.2-14.6_mipsel.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-mips/korn_2.2.2-14.6_mips.deb
stable/main/binary-mips/kppp_2.2.2-14.6_mips.deb
stable/main/binary-mips/libkdenetwork1_2.2.2-14.6_mips.deb
stable/main/binary-mips/kit_2.2.2-14.6_mips.deb
stable/main/binary-mips/kdict_2.2.2-14.6_mips.deb
stable/main/binary-mips/kmail_2.2.2-14.6_mips.deb
stable/main/binary-mips/klisa_2.2.2-14.6_mips.deb
stable/main/binary-mips/ktalkd_2.2.2-14.6_mips.deb
stable/main/binary-mips/libmimelib1_2.2.2-14.6_mips.deb
stable/main/binary-mips/libmimelib-dev_2.2.2-14.6_mips.deb
stable/main/binary-mips/ksirc_2.2.2-14.6_mips.deb
stable/main/binary-mips/knode_2.2.2-14.6_mips.deb
stable/main/binary-mips/knewsticker_2.2.2-14.6_mips.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-m68k/libkdenetwork1_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/kmail_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/libmimelib1_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/kppp_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/korn_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/knewsticker_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/libmimelib-dev_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/ksirc_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/ktalkd_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/kit_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/knode_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/kdict_2.2.2-14.6_m68k.deb
stable/main/binary-m68k/klisa_2.2.2-14.6_m68k.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-hppa/libmimelib-dev_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/libkdenetwork1_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/libmimelib1_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/kmail_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/kppp_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/knewsticker_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/korn_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/ktalkd_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/klisa_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/knode_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/ksirc_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/kdict_2.2.2-14.6_hppa.deb
stable/main/binary-hppa/kit_2.2.2-14.6_hppa.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-arm/knewsticker_2.2.2-14.6_arm.deb
stable/main/binary-arm/libmimelib-dev_2.2.2-14.6_arm.deb
stable/main/binary-arm/kmail_2.2.2-14.6_arm.deb
stable/main/binary-arm/kppp_2.2.2-14.6_arm.deb
stable/main/binary-arm/kdict_2.2.2-14.6_arm.deb
stable/main/binary-arm/libkdenetwork1_2.2.2-14.6_arm.deb
stable/main/binary-arm/korn_2.2.2-14.6_arm.deb
stable/main/binary-arm/klisa_2.2.2-14.6_arm.deb
stable/main/binary-arm/ktalkd_2.2.2-14.6_arm.deb
stable/main/binary-arm/ksirc_2.2.2-14.6_arm.deb
stable/main/binary-arm/knode_2.2.2-14.6_arm.deb
stable/main/binary-arm/kit_2.2.2-14.6_arm.deb
stable/main/binary-arm/libmimelib1_2.2.2-14.6_arm.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-alpha/knode_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/kit_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/kppp_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/kdict_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/klisa_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/ksirc_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/libmimelib1_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/libkdenetwork1_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/knewsticker_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/libmimelib-dev_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/kmail_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/ktalkd_2.2.2-14.6_alpha.deb
stable/main/binary-alpha/korn_2.2.2-14.6_alpha.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-ia64/libkdenetwork1_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/kit_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/libmimelib1_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/klisa_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/kmail_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/ktalkd_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/kppp_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/kdict_2.2.2-14.6_ia64.deb
stable/main/source/kdenetwork_2.2.2-14.6.diff.gz
stable/main/binary-ia64/libmimelib-dev_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/ksirc_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/knewsticker_2.2.2-14.6_ia64.deb
stable/main/binary-ia64/knode_2.2.2-14.6_ia64.deb
stable/main/source/kdenetwork_2.2.2-14.6.dsc
stable/main/binary-ia64/korn_2.2.2-14.6_ia64.deb
kdenetwork (4:2.2.2-14.6) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patches to fix several potential vulnerabilities.
    http://www.kde.org/info/security/advisory-20021220-1.txt


stable/main/binary-sparc/libarts-alsa_2.2.2-13.woody.8_sparc.deb
stable/main/binary-sparc/kdelibs3-cups_2.2.2-13.woody.8_sparc.deb
stable/main/binary-sparc/libkmid-alsa_2.2.2-13.woody.8_sparc.deb
stable/main/binary-sparc/libkmid-dev_2.2.2-13.woody.8_sparc.deb
stable/main/binary-sparc/libkmid_2.2.2-13.woody.8_sparc.deb
stable/main/binary-sparc/kdelibs-dev_2.2.2-13.woody.8_sparc.deb
stable/main/binary-sparc/libarts_2.2.2-13.woody.8_sparc.deb
stable/main/binary-sparc/kdelibs3-bin_2.2.2-13.woody.8_sparc.deb
stable/main/binary-sparc/kdelibs3_2.2.2-13.woody.8_sparc.deb
stable/main/binary-sparc/libarts-dev_2.2.2-13.woody.8_sparc.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-s390/kdelibs3-cups_2.2.2-13.woody.8_s390.deb
stable/main/binary-s390/kdelibs-dev_2.2.2-13.woody.8_s390.deb
stable/main/binary-s390/libarts_2.2.2-13.woody.8_s390.deb
stable/main/binary-s390/libkmid_2.2.2-13.woody.8_s390.deb
stable/main/binary-s390/libarts-dev_2.2.2-13.woody.8_s390.deb
stable/main/binary-s390/libkmid-alsa_2.2.2-13.woody.8_s390.deb
stable/main/binary-s390/libkmid-dev_2.2.2-13.woody.8_s390.deb
stable/main/binary-s390/kdelibs3_2.2.2-13.woody.8_s390.deb
stable/main/binary-s390/kdelibs3-bin_2.2.2-13.woody.8_s390.deb
stable/main/binary-s390/libarts-alsa_2.2.2-13.woody.8_s390.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-powerpc/libkmid-dev_2.2.2-13.woody.8_powerpc.deb
stable/main/binary-powerpc/kdelibs3-bin_2.2.2-13.woody.8_powerpc.deb
stable/main/binary-powerpc/libarts_2.2.2-13.woody.8_powerpc.deb
stable/main/binary-powerpc/libkmid_2.2.2-13.woody.8_powerpc.deb
stable/main/binary-powerpc/kdelibs3-cups_2.2.2-13.woody.8_powerpc.deb
stable/main/binary-powerpc/kdelibs-dev_2.2.2-13.woody.8_powerpc.deb
stable/main/binary-powerpc/libarts-dev_2.2.2-13.woody.8_powerpc.deb
stable/main/binary-powerpc/kdelibs3_2.2.2-13.woody.8_powerpc.deb
stable/main/binary-powerpc/libkmid-alsa_2.2.2-13.woody.8_powerpc.deb
stable/main/binary-powerpc/libarts-alsa_2.2.2-13.woody.8_powerpc.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-mipsel/kdelibs3_2.2.2-13.woody.8_mipsel.deb
stable/main/binary-mipsel/libarts-alsa_2.2.2-13.woody.8_mipsel.deb
stable/main/binary-mipsel/libkmid-dev_2.2.2-13.woody.8_mipsel.deb
stable/main/binary-mipsel/libarts-dev_2.2.2-13.woody.8_mipsel.deb
stable/main/binary-mipsel/kdelibs3-bin_2.2.2-13.woody.8_mipsel.deb
stable/main/binary-mipsel/libkmid-alsa_2.2.2-13.woody.8_mipsel.deb
stable/main/binary-mipsel/kdelibs3-cups_2.2.2-13.woody.8_mipsel.deb
stable/main/binary-mipsel/libkmid_2.2.2-13.woody.8_mipsel.deb
stable/main/binary-mipsel/libarts_2.2.2-13.woody.8_mipsel.deb
stable/main/binary-mipsel/kdelibs-dev_2.2.2-13.woody.8_mipsel.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-mips/kdelibs3-cups_2.2.2-13.woody.8_mips.deb
stable/main/binary-mips/kdelibs3-bin_2.2.2-13.woody.8_mips.deb
stable/main/binary-mips/libarts-dev_2.2.2-13.woody.8_mips.deb
stable/main/binary-mips/libkmid-dev_2.2.2-13.woody.8_mips.deb
stable/main/binary-mips/libkmid-alsa_2.2.2-13.woody.8_mips.deb
stable/main/binary-mips/libkmid_2.2.2-13.woody.8_mips.deb
stable/main/binary-mips/kdelibs3_2.2.2-13.woody.8_mips.deb
stable/main/binary-mips/libarts_2.2.2-13.woody.8_mips.deb
stable/main/binary-mips/kdelibs-dev_2.2.2-13.woody.8_mips.deb
stable/main/binary-mips/libarts-alsa_2.2.2-13.woody.8_mips.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-m68k/libkmid-dev_2.2.2-13.woody.8_m68k.deb
stable/main/binary-m68k/libarts-dev_2.2.2-13.woody.8_m68k.deb
stable/main/binary-m68k/libarts-alsa_2.2.2-13.woody.8_m68k.deb
stable/main/binary-m68k/libkmid-alsa_2.2.2-13.woody.8_m68k.deb
stable/main/binary-m68k/kdelibs3-bin_2.2.2-13.woody.8_m68k.deb
stable/main/binary-m68k/libarts_2.2.2-13.woody.8_m68k.deb
stable/main/binary-m68k/kdelibs3_2.2.2-13.woody.8_m68k.deb
stable/main/binary-m68k/kdelibs3-cups_2.2.2-13.woody.8_m68k.deb
stable/main/binary-m68k/libkmid_2.2.2-13.woody.8_m68k.deb
stable/main/binary-m68k/kdelibs-dev_2.2.2-13.woody.8_m68k.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-ia64/libkmid_2.2.2-13.woody.8_ia64.deb
stable/main/binary-ia64/kdelibs-dev_2.2.2-13.woody.8_ia64.deb
stable/main/binary-ia64/libkmid-dev_2.2.2-13.woody.8_ia64.deb
stable/main/binary-ia64/libarts_2.2.2-13.woody.8_ia64.deb
stable/main/binary-ia64/libkmid-alsa_2.2.2-13.woody.8_ia64.deb
stable/main/binary-ia64/kdelibs3-bin_2.2.2-13.woody.8_ia64.deb
stable/main/binary-ia64/kdelibs3-cups_2.2.2-13.woody.8_ia64.deb
stable/main/binary-ia64/kdelibs3_2.2.2-13.woody.8_ia64.deb
stable/main/binary-ia64/libarts-dev_2.2.2-13.woody.8_ia64.deb
stable/main/binary-ia64/libarts-alsa_2.2.2-13.woody.8_ia64.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-hppa/kdelibs3-cups_2.2.2-13.woody.8_hppa.deb
stable/main/binary-hppa/kdelibs3_2.2.2-13.woody.8_hppa.deb
stable/main/binary-hppa/libarts-dev_2.2.2-13.woody.8_hppa.deb
stable/main/binary-hppa/kdelibs-dev_2.2.2-13.woody.8_hppa.deb
stable/main/binary-hppa/libkmid-alsa_2.2.2-13.woody.8_hppa.deb
stable/main/binary-hppa/libarts-alsa_2.2.2-13.woody.8_hppa.deb
stable/main/binary-hppa/libkmid_2.2.2-13.woody.8_hppa.deb
stable/main/binary-hppa/libarts_2.2.2-13.woody.8_hppa.deb
stable/main/binary-hppa/kdelibs3-bin_2.2.2-13.woody.8_hppa.deb
stable/main/binary-hppa/libkmid-dev_2.2.2-13.woody.8_hppa.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-arm/libarts_2.2.2-13.woody.8_arm.deb
stable/main/binary-arm/libarts-alsa_2.2.2-13.woody.8_arm.deb
stable/main/binary-arm/libkmid-alsa_2.2.2-13.woody.8_arm.deb
stable/main/binary-arm/kdelibs3_2.2.2-13.woody.8_arm.deb
stable/main/binary-arm/libkmid-dev_2.2.2-13.woody.8_arm.deb
stable/main/binary-arm/kdelibs-dev_2.2.2-13.woody.8_arm.deb
stable/main/binary-arm/libarts-dev_2.2.2-13.woody.8_arm.deb
stable/main/binary-arm/libkmid_2.2.2-13.woody.8_arm.deb
stable/main/binary-arm/kdelibs3-cups_2.2.2-13.woody.8_arm.deb
stable/main/binary-arm/kdelibs3-bin_2.2.2-13.woody.8_arm.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-alpha/libarts-dev_2.2.2-13.woody.8_alpha.deb
stable/main/binary-alpha/kdelibs3_2.2.2-13.woody.8_alpha.deb
stable/main/binary-alpha/libkmid-alsa_2.2.2-13.woody.8_alpha.deb
stable/main/binary-alpha/kdelibs3-bin_2.2.2-13.woody.8_alpha.deb
stable/main/binary-alpha/libkmid_2.2.2-13.woody.8_alpha.deb
stable/main/binary-alpha/libarts_2.2.2-13.woody.8_alpha.deb
stable/main/binary-alpha/libkmid-dev_2.2.2-13.woody.8_alpha.deb
stable/main/binary-alpha/kdelibs-dev_2.2.2-13.woody.8_alpha.deb
stable/main/binary-alpha/kdelibs3-cups_2.2.2-13.woody.8_alpha.deb
stable/main/binary-alpha/libarts-alsa_2.2.2-13.woody.8_alpha.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-i386/libarts-alsa_2.2.2-13.woody.8_i386.deb
stable/main/binary-i386/libarts-dev_2.2.2-13.woody.8_i386.deb
stable/main/binary-i386/kdelibs3-cups_2.2.2-13.woody.8_i386.deb
stable/main/binary-i386/kdelibs-dev_2.2.2-13.woody.8_i386.deb
stable/main/source/kdelibs_2.2.2-13.woody.8.dsc
stable/main/binary-all/kdelibs3-doc_2.2.2-13.woody.8_all.deb
stable/main/source/kdelibs_2.2.2-13.woody.8.diff.gz
stable/main/binary-i386/libkmid_2.2.2-13.woody.8_i386.deb
stable/main/binary-i386/libkmid-alsa_2.2.2-13.woody.8_i386.deb
stable/main/binary-i386/kdelibs3-bin_2.2.2-13.woody.8_i386.deb
stable/main/binary-i386/libarts_2.2.2-13.woody.8_i386.deb
stable/main/binary-i386/libkmid-dev_2.2.2-13.woody.8_i386.deb
stable/main/binary-i386/kdelibs3_2.2.2-13.woody.8_i386.deb
kdelibs (4:2.2.2-13.woody.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply the following patches from upstream:
    - post-2.2.2-kdelibs-http.patch (CAN-2003-0459)
    - post-2.2.2-kdelibs-kio-2.diff (CAN-2003-0370)
    - post-2.2.2-kdelibs-kssl-2.diff (CAN-2003-0370)
  * These address the issues described in:
    - http://www.kde.org/info/security/advisory-20030602-1.txt
    - An upcoming KDE advisory regarding CAN-2003-0370


stable/main/binary-sparc/kcoloredit_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/kpaint_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/kooka_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/libkscan-dev_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/kfract_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/ksnapshot_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/kamera_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/libkscan1_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/kghostview_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/kiconedit_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/kview_2.2.2-6.11_sparc.deb
stable/main/binary-sparc/kruler_2.2.2-6.11_sparc.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-s390/kiconedit_2.2.2-6.11_s390.deb
stable/main/binary-s390/ksnapshot_2.2.2-6.11_s390.deb
stable/main/binary-s390/libkscan1_2.2.2-6.11_s390.deb
stable/main/binary-s390/kview_2.2.2-6.11_s390.deb
stable/main/binary-s390/kcoloredit_2.2.2-6.11_s390.deb
stable/main/binary-s390/kamera_2.2.2-6.11_s390.deb
stable/main/binary-s390/kfract_2.2.2-6.11_s390.deb
stable/main/binary-s390/libkscan-dev_2.2.2-6.11_s390.deb
stable/main/binary-s390/kruler_2.2.2-6.11_s390.deb
stable/main/binary-s390/kooka_2.2.2-6.11_s390.deb
stable/main/binary-s390/kpaint_2.2.2-6.11_s390.deb
stable/main/binary-s390/kghostview_2.2.2-6.11_s390.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-powerpc/kamera_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/ksnapshot_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/kview_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/libkscan1_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/kfract_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/kooka_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/kpaint_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/kghostview_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/kiconedit_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/kruler_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/kcoloredit_2.2.2-6.11_powerpc.deb
stable/main/binary-powerpc/libkscan-dev_2.2.2-6.11_powerpc.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-mipsel/kghostview_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/kiconedit_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/ksnapshot_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/kamera_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/libkscan1_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/kfract_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/kcoloredit_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/kruler_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/kooka_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/libkscan-dev_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/kview_2.2.2-6.11_mipsel.deb
stable/main/binary-mipsel/kpaint_2.2.2-6.11_mipsel.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-mips/kiconedit_2.2.2-6.11_mips.deb
stable/main/binary-mips/kfract_2.2.2-6.11_mips.deb
stable/main/binary-mips/kooka_2.2.2-6.11_mips.deb
stable/main/binary-mips/kghostview_2.2.2-6.11_mips.deb
stable/main/binary-mips/kpaint_2.2.2-6.11_mips.deb
stable/main/binary-mips/libkscan-dev_2.2.2-6.11_mips.deb
stable/main/binary-mips/kview_2.2.2-6.11_mips.deb
stable/main/binary-mips/kruler_2.2.2-6.11_mips.deb
stable/main/binary-mips/ksnapshot_2.2.2-6.11_mips.deb
stable/main/binary-mips/kcoloredit_2.2.2-6.11_mips.deb
stable/main/binary-mips/kamera_2.2.2-6.11_mips.deb
stable/main/binary-mips/libkscan1_2.2.2-6.11_mips.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-m68k/kpaint_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/kcoloredit_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/kghostview_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/kooka_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/kfract_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/libkscan-dev_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/kamera_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/ksnapshot_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/kruler_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/kiconedit_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/kview_2.2.2-6.11_m68k.deb
stable/main/binary-m68k/libkscan1_2.2.2-6.11_m68k.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-ia64/kghostview_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/kruler_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/libkscan-dev_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/ksnapshot_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/kooka_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/kpaint_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/kview_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/kfract_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/kiconedit_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/libkscan1_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/kamera_2.2.2-6.11_ia64.deb
stable/main/binary-ia64/kcoloredit_2.2.2-6.11_ia64.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-i386/libkscan1_2.2.2-6.11_i386.deb
stable/main/binary-i386/kpaint_2.2.2-6.11_i386.deb
stable/main/binary-i386/kiconedit_2.2.2-6.11_i386.deb
stable/main/binary-i386/kooka_2.2.2-6.11_i386.deb
stable/main/binary-i386/kruler_2.2.2-6.11_i386.deb
stable/main/binary-i386/libkscan-dev_2.2.2-6.11_i386.deb
stable/main/binary-i386/ksnapshot_2.2.2-6.11_i386.deb
stable/main/binary-i386/kfract_2.2.2-6.11_i386.deb
stable/main/binary-i386/kamera_2.2.2-6.11_i386.deb
stable/main/binary-i386/kghostview_2.2.2-6.11_i386.deb
stable/main/binary-i386/kcoloredit_2.2.2-6.11_i386.deb
stable/main/binary-i386/kview_2.2.2-6.11_i386.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-hppa/kview_2.2.2-6.11_hppa.deb
stable/main/binary-hppa/kcoloredit_2.2.2-6.11_hppa.deb
stable/main/binary-hppa/kfract_2.2.2-6.11_hppa.deb
stable/main/binary-hppa/kruler_2.2.2-6.11_hppa.deb
stable/main/binary-hppa/kghostview_2.2.2-6.11_hppa.deb
stable/main/binary-hppa/kamera_2.2.2-6.11_hppa.deb
stable/main/binary-hppa/kiconedit_2.2.2-6.11_hppa.deb
stable/main/binary-hppa/ksnapshot_2.2.2-6.11_hppa.deb
stable/main/binary-hppa/kpaint_2.2.2-6.11_hppa.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-alpha/kiconedit_2.2.2-6.11_alpha.deb
stable/main/source/kdegraphics_2.2.2-6.11.diff.gz
stable/main/binary-alpha/libkscan1_2.2.2-6.11_alpha.deb
stable/main/source/kdegraphics_2.2.2-6.11.dsc
stable/main/binary-alpha/kcoloredit_2.2.2-6.11_alpha.deb
stable/main/binary-alpha/kview_2.2.2-6.11_alpha.deb
stable/main/binary-alpha/kamera_2.2.2-6.11_alpha.deb
stable/main/binary-alpha/kfract_2.2.2-6.11_alpha.deb
stable/main/binary-alpha/libkscan-dev_2.2.2-6.11_alpha.deb
stable/main/binary-alpha/kruler_2.2.2-6.11_alpha.deb
stable/main/binary-alpha/kghostview_2.2.2-6.11_alpha.deb
stable/main/binary-alpha/kooka_2.2.2-6.11_alpha.deb
stable/main/binary-alpha/kpaint_2.2.2-6.11_alpha.deb
stable/main/binary-alpha/ksnapshot_2.2.2-6.11_alpha.deb
kdegraphics (4:2.2.2-6.11) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch so ghostscript won't execute arbitrary commands
    hidden inside of postscript files.


stable/main/binary-sparc/konsole_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/kdebase-audiolibs_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/libkonq3_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/kscreensaver_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/kate_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/konqueror_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/kdebase-dev_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/libkonq-dev_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/kdm_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/kdebase_2.2.2-14.7_sparc.deb
stable/main/binary-sparc/kdebase-libs_2.2.2-14.7_sparc.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-s390/kdebase-dev_2.2.2-14.7_s390.deb
stable/main/binary-s390/kate_2.2.2-14.7_s390.deb
stable/main/binary-s390/kscreensaver_2.2.2-14.7_s390.deb
stable/main/binary-s390/konqueror_2.2.2-14.7_s390.deb
stable/main/binary-s390/kdm_2.2.2-14.7_s390.deb
stable/main/binary-s390/libkonq-dev_2.2.2-14.7_s390.deb
stable/main/binary-s390/kdebase_2.2.2-14.7_s390.deb
stable/main/binary-s390/libkonq3_2.2.2-14.7_s390.deb
stable/main/binary-s390/konsole_2.2.2-14.7_s390.deb
stable/main/binary-s390/kdebase-libs_2.2.2-14.7_s390.deb
stable/main/binary-s390/kdebase-audiolibs_2.2.2-14.7_s390.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-powerpc/kdebase-libs_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/kdm_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/kate_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/kscreensaver_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/kdebase_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/konsole_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/libkonq-dev_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/konqueror_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/kdebase-dev_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/libkonq3_2.2.2-14.7_powerpc.deb
stable/main/binary-powerpc/kdebase-audiolibs_2.2.2-14.7_powerpc.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-mipsel/kdebase-libs_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/kdm_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/kscreensaver_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/kate_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/libkonq3_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/kdebase_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/kdebase-dev_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/konsole_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/kdebase-audiolibs_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/libkonq-dev_2.2.2-14.7_mipsel.deb
stable/main/binary-mipsel/konqueror_2.2.2-14.7_mipsel.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-mips/konsole_2.2.2-14.7_mips.deb
stable/main/binary-mips/libkonq-dev_2.2.2-14.7_mips.deb
stable/main/binary-mips/kdebase-libs_2.2.2-14.7_mips.deb
stable/main/binary-mips/kdm_2.2.2-14.7_mips.deb
stable/main/binary-mips/kdebase_2.2.2-14.7_mips.deb
stable/main/binary-mips/kate_2.2.2-14.7_mips.deb
stable/main/binary-mips/kdebase-dev_2.2.2-14.7_mips.deb
stable/main/binary-mips/konqueror_2.2.2-14.7_mips.deb
stable/main/binary-mips/kscreensaver_2.2.2-14.7_mips.deb
stable/main/binary-mips/libkonq3_2.2.2-14.7_mips.deb
stable/main/binary-mips/kdebase-audiolibs_2.2.2-14.7_mips.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-m68k/konqueror_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/konsole_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/kdebase_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/kdebase-libs_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/kdm_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/libkonq3_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/kscreensaver_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/libkonq-dev_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/kdebase-dev_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/kdebase-audiolibs_2.2.2-14.7_m68k.deb
stable/main/binary-m68k/kate_2.2.2-14.7_m68k.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-ia64/kate_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/kdebase-dev_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/kdm_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/kdebase-audiolibs_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/kdebase_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/kscreensaver_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/konsole_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/libkonq3_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/libkonq-dev_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/kdebase-libs_2.2.2-14.7_ia64.deb
stable/main/binary-ia64/konqueror_2.2.2-14.7_ia64.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-hppa/konqueror_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/kdebase_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/kdebase-audiolibs_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/konsole_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/kdm_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/libkonq3_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/kscreensaver_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/kate_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/kdebase-libs_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/kdebase-dev_2.2.2-14.7_hppa.deb
stable/main/binary-hppa/libkonq-dev_2.2.2-14.7_hppa.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-arm/kscreensaver_2.2.2-14.7_arm.deb
stable/main/binary-arm/kdm_2.2.2-14.7_arm.deb
stable/main/binary-arm/libkonq-dev_2.2.2-14.7_arm.deb
stable/main/binary-arm/kdebase_2.2.2-14.7_arm.deb
stable/main/binary-arm/konsole_2.2.2-14.7_arm.deb
stable/main/binary-arm/kdebase-audiolibs_2.2.2-14.7_arm.deb
stable/main/binary-arm/libkonq3_2.2.2-14.7_arm.deb
stable/main/binary-arm/kdebase-libs_2.2.2-14.7_arm.deb
stable/main/binary-arm/konqueror_2.2.2-14.7_arm.deb
stable/main/binary-arm/kate_2.2.2-14.7_arm.deb
stable/main/binary-arm/kdebase-dev_2.2.2-14.7_arm.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-alpha/kdebase-dev_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/kate_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/kdebase_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/libkonq-dev_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/libkonq3_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/konsole_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/konqueror_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/kscreensaver_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/kdebase-audiolibs_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/kdebase-libs_2.2.2-14.7_alpha.deb
stable/main/binary-alpha/kdm_2.2.2-14.7_alpha.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/source/kdebase_2.2.2-14.7.dsc
stable/main/binary-i386/konqueror_2.2.2-14.7_i386.deb
stable/main/binary-i386/kscreensaver_2.2.2-14.7_i386.deb
stable/main/binary-i386/kdebase-libs_2.2.2-14.7_i386.deb
stable/main/binary-i386/libkonq-dev_2.2.2-14.7_i386.deb
stable/main/binary-i386/konsole_2.2.2-14.7_i386.deb
stable/main/source/kdebase_2.2.2-14.7.diff.gz
stable/main/binary-i386/kdebase_2.2.2-14.7_i386.deb
stable/main/binary-i386/kdm_2.2.2-14.7_i386.deb
stable/main/binary-all/kdebase-doc_2.2.2-14.7_all.deb
stable/main/binary-i386/kate_2.2.2-14.7_i386.deb
stable/main/binary-i386/kdebase-dev_2.2.2-14.7_i386.deb
stable/main/binary-i386/libkonq3_2.2.2-14.7_i386.deb
stable/main/binary-i386/kdebase-audiolibs_2.2.2-14.7_i386.deb
stable/main/binary-all/kdewallpapers_2.2.2-14.7_all.deb
kdebase (4:2.2.2-14.7) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Updated patch from KDE advisory 20030916


stable/main/binary-sparc/jnethack_1.1.5-11woody2_sparc.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-s390/jnethack_1.1.5-11woody2_s390.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-powerpc/jnethack_1.1.5-11woody2_powerpc.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-mipsel/jnethack_1.1.5-11woody2_mipsel.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-mips/jnethack_1.1.5-11woody2_mips.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-m68k/jnethack_1.1.5-11woody2_m68k.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-ia64/jnethack_1.1.5-11woody2_ia64.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-hppa/jnethack_1.1.5-11woody2_hppa.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-arm/jnethack_1.1.5-11woody2_arm.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-alpha/jnethack_1.1.5-11woody2_alpha.deb
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-i386/jnethack_1.1.5-11woody2_i386.deb
stable/main/source/jnethack_1.1.5-11woody2.dsc
stable/main/source/jnethack_1.1.5-11woody2.diff.gz
jnethack (1.1.5-11woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Based on maintainer's 1.1.5-11woody1 upload to proposed-updates,
    which fixes CAN-2003-0359 and CAN-2003-0358


stable/main/binary-sparc/jigdo-file_0.6.5-2_sparc.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-s390/jigdo-file_0.6.5-2_s390.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-powerpc/jigdo-file_0.6.5-2_powerpc.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-mipsel/jigdo-file_0.6.5-2_mipsel.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-mips/jigdo-file_0.6.5-2_mips.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-m68k/jigdo-file_0.6.5-2_m68k.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-ia64/jigdo-file_0.6.5-2_ia64.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-hppa/jigdo-file_0.6.5-2_hppa.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-arm/jigdo-file_0.6.5-2_arm.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-alpha/jigdo-file_0.6.5-2_alpha.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/source/jigdo_0.6.5-2.dsc
stable/main/source/jigdo_0.6.5-2.diff.gz
stable/main/binary-i386/jigdo-file_0.6.5-2_i386.deb
jigdo (0.6.5-2) stable; urgency=low
  * Backported some changes from 0.6.8 to stable:
  * Relative template URLs allowed, closes: #149885
  * jigdo-lite/mirror use "jigdo-file --no-cache" when reading
    downloaded files from tmp dir, closes: #150973


stable/main/binary-s390/bitchx-gtk_1.0-0c19-1.1_s390.deb
stable/main/binary-s390/bitchx-ssl_1.0-0c19-1.1_s390.deb
stable/main/binary-s390/bitchx-dev_1.0-0c19-1.1_s390.deb
stable/main/binary-s390/bitchx_1.0-0c19-1.1_s390.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-powerpc/bitchx-gtk_1.0-0c19-1.1_powerpc.deb
stable/main/binary-powerpc/bitchx-ssl_1.0-0c19-1.1_powerpc.deb
stable/main/binary-powerpc/bitchx-dev_1.0-0c19-1.1_powerpc.deb
stable/main/binary-powerpc/bitchx_1.0-0c19-1.1_powerpc.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-mipsel/bitchx-dev_1.0-0c19-1.1_mipsel.deb
stable/main/binary-mipsel/bitchx-gtk_1.0-0c19-1.1_mipsel.deb
stable/main/binary-mipsel/bitchx_1.0-0c19-1.1_mipsel.deb
stable/main/binary-mipsel/bitchx-ssl_1.0-0c19-1.1_mipsel.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-mips/bitchx-gtk_1.0-0c19-1.1_mips.deb
stable/main/binary-mips/bitchx_1.0-0c19-1.1_mips.deb
stable/main/binary-mips/bitchx-dev_1.0-0c19-1.1_mips.deb
stable/main/binary-mips/bitchx-ssl_1.0-0c19-1.1_mips.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-m68k/bitchx_1.0-0c19-1.1_m68k.deb
stable/main/binary-m68k/bitchx-gtk_1.0-0c19-1.1_m68k.deb
stable/main/binary-m68k/bitchx-ssl_1.0-0c19-1.1_m68k.deb
stable/main/binary-m68k/bitchx-dev_1.0-0c19-1.1_m68k.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-ia64/bitchx_1.0-0c19-1.1_ia64.deb
stable/main/binary-ia64/bitchx-ssl_1.0-0c19-1.1_ia64.deb
stable/main/binary-ia64/bitchx-dev_1.0-0c19-1.1_ia64.deb
stable/main/binary-ia64/bitchx-gtk_1.0-0c19-1.1_ia64.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-i386/bitchx-ssl_1.0-0c19-1.1_i386.deb
stable/main/binary-i386/bitchx-dev_1.0-0c19-1.1_i386.deb
stable/main/binary-i386/bitchx_1.0-0c19-1.1_i386.deb
stable/main/binary-i386/bitchx-gtk_1.0-0c19-1.1_i386.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-hppa/bitchx-gtk_1.0-0c19-1.1_hppa.deb
stable/main/binary-hppa/bitchx-dev_1.0-0c19-1.1_hppa.deb
stable/main/binary-hppa/bitchx-ssl_1.0-0c19-1.1_hppa.deb
stable/main/binary-hppa/bitchx_1.0-0c19-1.1_hppa.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-arm/bitchx_1.0-0c19-1.1_arm.deb
stable/main/binary-arm/bitchx-ssl_1.0-0c19-1.1_arm.deb
stable/main/binary-arm/bitchx-dev_1.0-0c19-1.1_arm.deb
stable/main/binary-arm/bitchx-gtk_1.0-0c19-1.1_arm.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-alpha/bitchx-ssl_1.0-0c19-1.1_alpha.deb
stable/main/binary-alpha/bitchx-gtk_1.0-0c19-1.1_alpha.deb
stable/main/binary-alpha/bitchx_1.0-0c19-1.1_alpha.deb
stable/main/binary-alpha/bitchx-dev_1.0-0c19-1.1_alpha.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-sparc/bitchx-ssl_1.0-0c19-1.1_sparc.deb
stable/main/source/ircii-pana_1.0-0c19-1.1.diff.gz
stable/main/binary-sparc/bitchx-gtk_1.0-0c19-1.1_sparc.deb
stable/main/binary-sparc/bitchx-dev_1.0-0c19-1.1_sparc.deb
stable/main/source/ircii-pana_1.0-0c19-1.1.dsc
stable/main/binary-sparc/bitchx_1.0-0c19-1.1_sparc.deb
ircii-pana (1:1.0-0c19-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch by caf@guarana.org to fix problems reported by Timo
    Sirainen <tss@iki.fi>


stable/main/binary-all/ipmasq_3.5.10c_all.deb
stable/main/source/ipmasq_3.5.10c.dsc
stable/main/source/ipmasq_3.5.10c.tar.gz
ipmasq (3.5.10c) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Note that the issue fixed in 3.5.10b is CAN-2003-0785


stable/main/binary-all/xfonts-intl-european_1.2.1-0.woody.1_all.deb
stable/main/binary-all/xfonts-intl-chinese_1.2.1-0.woody.1_all.deb
stable/main/source/intlfonts_1.2.1-0.woody.1.diff.gz
stable/main/binary-all/xfonts-intl-asian_1.2.1-0.woody.1_all.deb
stable/main/binary-all/xfonts-intl-phonetic_1.2.1-0.woody.1_all.deb
stable/main/binary-all/xfonts-intl-japanese_1.2.1-0.woody.1_all.deb
stable/main/binary-all/xfonts-intl-arabic_1.2.1-0.woody.1_all.deb
stable/main/binary-all/xfonts-intl-chinese-big_1.2.1-0.woody.1_all.deb
stable/main/binary-all/xfonts-intl-japanese-big_1.2.1-0.woody.1_all.deb
stable/main/source/intlfonts_1.2.1-0.woody.1.dsc
intlfonts (1.2.1-0.woody.1) stable; urgency=high
  * New upstream release, backported to woody.  It fixes the licensing
    problem with Japanese big fonts that we are not allowed to distribute.


stable/main/source/imp_2.2.6-5.2.dsc
stable/main/source/imp_2.2.6-5.2.diff.gz
stable/main/binary-all/imp_2.2.6-5.2_all.deb
imp (3:2.2.6-5.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Small correction for db.pgsql


stable/main/binary-sparc/libmagick++5_5.4.4.5-1woody1_sparc.deb
stable/main/binary-sparc/imagemagick_5.4.4.5-1woody1_sparc.deb
stable/main/binary-sparc/perlmagick_5.4.4.5-1woody1_sparc.deb
stable/main/binary-sparc/libmagick++5-dev_5.4.4.5-1woody1_sparc.deb
stable/main/binary-sparc/libmagick5_5.4.4.5-1woody1_sparc.deb
stable/main/binary-sparc/libmagick5-dev_5.4.4.5-1woody1_sparc.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-s390/libmagick5-dev_5.4.4.5-1woody1_s390.deb
stable/main/binary-s390/libmagick++5_5.4.4.5-1woody1_s390.deb
stable/main/binary-s390/libmagick++5-dev_5.4.4.5-1woody1_s390.deb
stable/main/binary-s390/libmagick5_5.4.4.5-1woody1_s390.deb
stable/main/binary-s390/perlmagick_5.4.4.5-1woody1_s390.deb
stable/main/binary-s390/imagemagick_5.4.4.5-1woody1_s390.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-powerpc/libmagick5_5.4.4.5-1woody1_powerpc.deb
stable/main/binary-powerpc/libmagick++5-dev_5.4.4.5-1woody1_powerpc.deb
stable/main/binary-powerpc/perlmagick_5.4.4.5-1woody1_powerpc.deb
stable/main/binary-powerpc/libmagick5-dev_5.4.4.5-1woody1_powerpc.deb
stable/main/binary-powerpc/libmagick++5_5.4.4.5-1woody1_powerpc.deb
stable/main/binary-powerpc/imagemagick_5.4.4.5-1woody1_powerpc.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-mipsel/libmagick5-dev_5.4.4.5-1woody1_mipsel.deb
stable/main/binary-mipsel/perlmagick_5.4.4.5-1woody1_mipsel.deb
stable/main/binary-mipsel/libmagick5_5.4.4.5-1woody1_mipsel.deb
stable/main/binary-mipsel/libmagick++5-dev_5.4.4.5-1woody1_mipsel.deb
stable/main/binary-mipsel/imagemagick_5.4.4.5-1woody1_mipsel.deb
stable/main/binary-mipsel/libmagick++5_5.4.4.5-1woody1_mipsel.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-mips/libmagick++5-dev_5.4.4.5-1woody1_mips.deb
stable/main/binary-mips/libmagick5_5.4.4.5-1woody1_mips.deb
stable/main/binary-mips/perlmagick_5.4.4.5-1woody1_mips.deb
stable/main/binary-mips/imagemagick_5.4.4.5-1woody1_mips.deb
stable/main/binary-mips/libmagick5-dev_5.4.4.5-1woody1_mips.deb
stable/main/binary-mips/libmagick++5_5.4.4.5-1woody1_mips.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-m68k/imagemagick_5.4.4.5-1woody1_m68k.deb
stable/main/binary-m68k/libmagick++5-dev_5.4.4.5-1woody1_m68k.deb
stable/main/binary-m68k/libmagick++5_5.4.4.5-1woody1_m68k.deb
stable/main/binary-m68k/libmagick5-dev_5.4.4.5-1woody1_m68k.deb
stable/main/binary-m68k/libmagick5_5.4.4.5-1woody1_m68k.deb
stable/main/binary-m68k/perlmagick_5.4.4.5-1woody1_m68k.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-ia64/libmagick5-dev_5.4.4.5-1woody1_ia64.deb
stable/main/binary-ia64/imagemagick_5.4.4.5-1woody1_ia64.deb
stable/main/binary-ia64/libmagick++5_5.4.4.5-1woody1_ia64.deb
stable/main/binary-ia64/libmagick++5-dev_5.4.4.5-1woody1_ia64.deb
stable/main/binary-ia64/perlmagick_5.4.4.5-1woody1_ia64.deb
stable/main/binary-ia64/libmagick5_5.4.4.5-1woody1_ia64.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-hppa/perlmagick_5.4.4.5-1woody1_hppa.deb
stable/main/binary-hppa/libmagick5-dev_5.4.4.5-1woody1_hppa.deb
stable/main/binary-hppa/libmagick5_5.4.4.5-1woody1_hppa.deb
stable/main/binary-hppa/libmagick++5-dev_5.4.4.5-1woody1_hppa.deb
stable/main/binary-hppa/libmagick++5_5.4.4.5-1woody1_hppa.deb
stable/main/binary-hppa/imagemagick_5.4.4.5-1woody1_hppa.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-arm/libmagick++5-dev_5.4.4.5-1woody1_arm.deb
stable/main/binary-arm/libmagick5_5.4.4.5-1woody1_arm.deb
stable/main/binary-arm/perlmagick_5.4.4.5-1woody1_arm.deb
stable/main/binary-arm/libmagick5-dev_5.4.4.5-1woody1_arm.deb
stable/main/binary-arm/libmagick++5_5.4.4.5-1woody1_arm.deb
stable/main/binary-arm/imagemagick_5.4.4.5-1woody1_arm.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-alpha/libmagick++5_5.4.4.5-1woody1_alpha.deb
stable/main/binary-alpha/libmagick5-dev_5.4.4.5-1woody1_alpha.deb
stable/main/binary-alpha/perlmagick_5.4.4.5-1woody1_alpha.deb
stable/main/binary-alpha/libmagick++5-dev_5.4.4.5-1woody1_alpha.deb
stable/main/binary-alpha/imagemagick_5.4.4.5-1woody1_alpha.deb
stable/main/binary-alpha/libmagick5_5.4.4.5-1woody1_alpha.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/source/imagemagick_5.4.4.5-1woody1.diff.gz
stable/main/binary-i386/perlmagick_5.4.4.5-1woody1_i386.deb
stable/main/binary-i386/libmagick++5_5.4.4.5-1woody1_i386.deb
stable/main/source/imagemagick_5.4.4.5-1woody1.dsc
stable/main/binary-i386/libmagick5-dev_5.4.4.5-1woody1_i386.deb
stable/main/binary-i386/libmagick5_5.4.4.5-1woody1_i386.deb
stable/main/binary-i386/libmagick++5-dev_5.4.4.5-1woody1_i386.deb
stable/main/binary-i386/imagemagick_5.4.4.5-1woody1_i386.deb
imagemagick (4:5.4.4.5-1woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Daniel Kobras to fix insecure temporary file creation
    (CAN-2003-0455)


stable/main/binary-ia64/illuminator-demo_0.3.2-1.woody.2_ia64.deb
stable/main/binary-ia64/illuminator0_0.3.2-1.woody.2_ia64.deb
stable/main/binary-ia64/illuminator-dev_0.3.2-1.woody.2_ia64.deb
illuminator (0.3.2-1.woody.2) testing; urgency=low
  * D'OH!  Forgot to set the distribution to "testing" before upload...


stable/main/binary-s390/hypermail_2.1.3-2.0_s390.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-powerpc/hypermail_2.1.3-2.0_powerpc.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-mipsel/hypermail_2.1.3-2.0_mipsel.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-mips/hypermail_2.1.3-2.0_mips.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-m68k/hypermail_2.1.3-2.0_m68k.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-ia64/hypermail_2.1.3-2.0_ia64.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-i386/hypermail_2.1.3-2.0_i386.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-hppa/hypermail_2.1.3-2.0_hppa.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-arm/hypermail_2.1.3-2.0_arm.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-alpha/hypermail_2.1.3-2.0_alpha.deb
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-sparc/hypermail_2.1.3-2.0_sparc.deb
stable/main/source/hypermail_2.1.3-2.0.dsc
stable/main/source/hypermail_2.1.3-2.0.diff.gz
hypermail (2.1.3-2.0) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow when progress = 2 and a long attachment filename
    (upstream)
  * Fixed broken use of mkstemp() in parse.c that could potentially crash
    hypermail
  * Backported additional buffer overflow checks from upstream
  * Fix possible buffer overflow with long hostname (upstream)
  * Moved the build of hypermail back to the build target


stable/main/binary-sparc/hylafax-client_4.1.1-3_sparc.deb
stable/main/binary-sparc/hylafax-server_4.1.1-3_sparc.deb
hylafax (1:4.1.1-3) stable-security; urgency=high
  * Backport from the 4.1.8 security release that fixes a remotely exploitable
    format string vulnerability in hfaxd that could be present
    in certain non-default configurations. (CAN-2003-0886)


stable/main/binary-s390/hylafax-server_4.1.1-3_s390.deb
stable/main/binary-s390/hylafax-client_4.1.1-3_s390.deb
hylafax (1:4.1.1-3) stable-security; urgency=high
  * Backport from the 4.1.8 security release that fixes a remotely exploitable
    format string vulnerability in hfaxd that could be present
    in certain non-default configurations. (CAN-2003-0886)


stable/main/binary-m68k/hylafax-client_4.1.1-3_m68k.deb
stable/main/binary-m68k/hylafax-server_4.1.1-3_m68k.deb
hylafax (1:4.1.1-3) stable-security; urgency=high
  * Backport from the 4.1.8 security release that fixes a remotely exploitable
    format string vulnerability in hfaxd that could be present
    in certain non-default configurations. (CAN-2003-0886)


stable/main/binary-ia64/hylafax-server_4.1.1-3_ia64.deb
stable/main/binary-ia64/hylafax-client_4.1.1-3_ia64.deb
hylafax (1:4.1.1-3) stable-security; urgency=high
  * Backport from the 4.1.8 security release that fixes a remotely exploitable
    format string vulnerability in hfaxd that could be present
    in certain non-default configurations. (CAN-2003-0886)


stable/main/binary-i386/hylafax-client_4.1.1-3_i386.deb
stable/main/binary-i386/hylafax-server_4.1.1-3_i386.deb
hylafax (1:4.1.1-3) stable-security; urgency=high
  * Backport from the 4.1.8 security release that fixes a remotely exploitable
    format string vulnerability in hfaxd that could be present
    in certain non-default configurations. (CAN-2003-0886)


stable/main/binary-hppa/hylafax-server_4.1.1-3_hppa.deb
stable/main/binary-hppa/hylafax-client_4.1.1-3_hppa.deb
hylafax (1:4.1.1-3) stable-security; urgency=high
  * Backport from the 4.1.8 security release that fixes a remotely exploitable
    format string vulnerability in hfaxd that could be present
    in certain non-default configurations. (CAN-2003-0886)


stable/main/binary-arm/hylafax-server_4.1.1-3_arm.deb
stable/main/binary-arm/hylafax-client_4.1.1-3_arm.deb
hylafax (1:4.1.1-3) stable-security; urgency=high
  * Backport from the 4.1.8 security release that fixes a remotely exploitable
    format string vulnerability in hfaxd that could be present
    in certain non-default configurations. (CAN-2003-0886)


stable/main/binary-alpha/hylafax-server_4.1.1-3_alpha.deb
stable/main/binary-alpha/hylafax-client_4.1.1-3_alpha.deb
hylafax (1:4.1.1-3) stable-security; urgency=high
  * Backport from the 4.1.8 security release that fixes a remotely exploitable
    format string vulnerability in hfaxd that could be present
    in certain non-default configurations. (CAN-2003-0886)


stable/main/source/hylafax_4.1.1-3.dsc
stable/main/binary-powerpc/hylafax-server_4.1.1-3_powerpc.deb
stable/main/binary-all/hylafax-doc_4.1.1-3_all.deb
stable/main/binary-powerpc/hylafax-client_4.1.1-3_powerpc.deb
stable/main/source/hylafax_4.1.1-3.diff.gz
hylafax (1:4.1.1-3) stable-security; urgency=high
  * Backport from the 4.1.8 security release that fixes a remotely exploitable
    format string vulnerability in hfaxd that could be present
    in certain non-default configurations. (CAN-2003-0886)


stable/main/binary-sparc/gzip_1.3.2-3woody1_sparc.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/binary-s390/gzip_1.3.2-3woody1_s390.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/binary-powerpc/gzip_1.3.2-3woody1_powerpc.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/binary-mipsel/gzip_1.3.2-3woody1_mipsel.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/binary-mips/gzip_1.3.2-3woody1_mips.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/binary-m68k/gzip_1.3.2-3woody1_m68k.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/binary-ia64/gzip_1.3.2-3woody1_ia64.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/binary-hppa/gzip_1.3.2-3woody1_hppa.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/binary-arm/gzip_1.3.2-3woody1_arm.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/binary-alpha/gzip_1.3.2-3woody1_alpha.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/source/gzip_1.3.2-3woody1.dsc
stable/main/source/gzip_1.3.2-3woody1.diff.gz
stable/main/binary-i386/gzip_1.3.2-3woody1_i386.deb
gzip (1.3.2-3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix multiple instances of insecure temporary files
    - gzexe.in (CVE-1999-1332), which became un-fixed sometime since potato
    - znew (CAN-2003-0367)


stable/main/source/gs-common_0.3.3.0woody1.tar.gz
stable/main/binary-all/gs-common_0.3.3.0woody1_all.deb
stable/main/source/gs-common_0.3.3.0woody1.dsc
gs-common (0.3.3.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch ps2epsi to create a temporary file securely using tempfile


stable/main/binary-sparc/gopher_3.0.3woody1_sparc.deb
stable/main/binary-sparc/gopherd_3.0.3woody1_sparc.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-s390/gopher_3.0.3woody1_s390.deb
stable/main/binary-s390/gopherd_3.0.3woody1_s390.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-powerpc/gopher_3.0.3woody1_powerpc.deb
stable/main/binary-powerpc/gopherd_3.0.3woody1_powerpc.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-mipsel/gopherd_3.0.3woody1_mipsel.deb
stable/main/binary-mipsel/gopher_3.0.3woody1_mipsel.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-mips/gopher_3.0.3woody1_mips.deb
stable/main/binary-mips/gopherd_3.0.3woody1_mips.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-m68k/gopherd_3.0.3woody1_m68k.deb
stable/main/binary-m68k/gopher_3.0.3woody1_m68k.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-ia64/gopherd_3.0.3woody1_ia64.deb
stable/main/binary-ia64/gopher_3.0.3woody1_ia64.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-hppa/gopher_3.0.3woody1_hppa.deb
stable/main/binary-hppa/gopherd_3.0.3woody1_hppa.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-arm/gopherd_3.0.3woody1_arm.deb
stable/main/binary-arm/gopher_3.0.3woody1_arm.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-alpha/gopherd_3.0.3woody1_alpha.deb
stable/main/binary-alpha/gopher_3.0.3woody1_alpha.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/source/gopher_3.0.3woody1.dsc
stable/main/source/gopher_3.0.3woody1.tar.gz
stable/main/binary-i386/gopherd_3.0.3woody1_i386.deb
stable/main/binary-i386/gopher_3.0.3woody1_i386.deb
gopher (3.0.3woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team.
  * Fix multiple buffer overflows in FTP handling code and
    authentication code. (CAN-2003-0805)


stable/main/binary-sparc/gnupg_1.0.6-4_sparc.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-s390/gnupg_1.0.6-4_s390.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-powerpc/gnupg_1.0.6-4_powerpc.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-mipsel/gnupg_1.0.6-4_mipsel.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-mips/gnupg_1.0.6-4_mips.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-m68k/gnupg_1.0.6-4_m68k.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-ia64/gnupg_1.0.6-4_ia64.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-hppa/gnupg_1.0.6-4_hppa.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-arm/gnupg_1.0.6-4_arm.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-alpha/gnupg_1.0.6-4_alpha.deb
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/source/gnupg_1.0.6-4.dsc
stable/main/binary-i386/gnupg_1.0.6-4_i386.deb
stable/main/source/gnupg_1.0.6-4.diff.gz
gnupg (1.0.6-4) stable; urgency=high
  * g10/parse-packet.c (parse_trust): Patch from Werner to fix
    compatability with keyrings written to by 1.0.7 and later.
  * cipher/random.c (add_randomness): Security fix from Werner.


stable/main/binary-sparc/gnocatan-server_0.6.1-5woody2_sparc.deb
stable/main/binary-sparc/gnocatan-client_0.6.1-5woody2_sparc.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-s390/gnocatan-server_0.6.1-5woody2_s390.deb
stable/main/binary-s390/gnocatan-client_0.6.1-5woody2_s390.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-powerpc/gnocatan-server_0.6.1-5woody2_powerpc.deb
stable/main/binary-powerpc/gnocatan-client_0.6.1-5woody2_powerpc.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-mipsel/gnocatan-client_0.6.1-5woody2_mipsel.deb
stable/main/binary-mipsel/gnocatan-server_0.6.1-5woody2_mipsel.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-mips/gnocatan-server_0.6.1-5woody2_mips.deb
stable/main/binary-mips/gnocatan-client_0.6.1-5woody2_mips.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-m68k/gnocatan-server_0.6.1-5woody2_m68k.deb
stable/main/binary-m68k/gnocatan-client_0.6.1-5woody2_m68k.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-ia64/gnocatan-client_0.6.1-5woody2_ia64.deb
stable/main/binary-ia64/gnocatan-server_0.6.1-5woody2_ia64.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-arm/gnocatan-server_0.6.1-5woody2_arm.deb
stable/main/binary-arm/gnocatan-client_0.6.1-5woody2_arm.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-alpha/gnocatan-server_0.6.1-5woody2_alpha.deb
stable/main/binary-alpha/gnocatan-client_0.6.1-5woody2_alpha.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-i386/gnocatan-client_0.6.1-5woody2_i386.deb
stable/main/source/gnocatan_0.6.1-5woody2.dsc
stable/main/binary-all/gnocatan-help_0.6.1-5woody2_all.deb
stable/main/binary-all/gnocatan-data_0.6.1-5woody2_all.deb
stable/main/source/gnocatan_0.6.1-5woody2.diff.gz
stable/main/binary-i386/gnocatan-server_0.6.1-5woody2_i386.deb
gnocatan (0.6.1-5woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Remove build-depends on fakeroot(?!) which doesn't exist on, e.g., mips
  * Fix line/str/offset mixup buglet [common/state.c]


stable/main/binary-sparc/libc6-sparc64_2.2.5-11.5_sparc.deb
stable/main/binary-sparc/libc6-prof_2.2.5-11.5_sparc.deb
stable/main/binary-sparc/libc6-dev_2.2.5-11.5_sparc.deb
stable/main/binary-sparc/libc6_2.2.5-11.5_sparc.deb
stable/main/binary-sparc/libc6-pic_2.2.5-11.5_sparc.deb
stable/main/binary-sparc/libc6-dev-sparc64_2.2.5-11.5_sparc.deb
stable/main/binary-sparc/libc6-dbg_2.2.5-11.5_sparc.deb
stable/main/binary-sparc/nscd_2.2.5-11.5_sparc.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-s390/libc6-pic_2.2.5-11.5_s390.deb
stable/main/binary-s390/libc6-dbg_2.2.5-11.5_s390.deb
stable/main/binary-s390/libc6-prof_2.2.5-11.5_s390.deb
stable/main/binary-s390/libc6_2.2.5-11.5_s390.deb
stable/main/binary-s390/nscd_2.2.5-11.5_s390.deb
stable/main/binary-s390/libc6-dev_2.2.5-11.5_s390.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-powerpc/libc6-dev_2.2.5-11.5_powerpc.deb
stable/main/binary-powerpc/libc6_2.2.5-11.5_powerpc.deb
stable/main/binary-powerpc/libc6-dbg_2.2.5-11.5_powerpc.deb
stable/main/binary-powerpc/nscd_2.2.5-11.5_powerpc.deb
stable/main/binary-powerpc/libc6-prof_2.2.5-11.5_powerpc.deb
stable/main/binary-powerpc/libc6-pic_2.2.5-11.5_powerpc.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-mipsel/nscd_2.2.5-11.5_mipsel.deb
stable/main/binary-mipsel/libc6-dev_2.2.5-11.5_mipsel.deb
stable/main/binary-mipsel/libc6-prof_2.2.5-11.5_mipsel.deb
stable/main/binary-mipsel/libc6_2.2.5-11.5_mipsel.deb
stable/main/binary-mipsel/libc6-dbg_2.2.5-11.5_mipsel.deb
stable/main/binary-mipsel/libc6-pic_2.2.5-11.5_mipsel.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-mips/nscd_2.2.5-11.5_mips.deb
stable/main/binary-mips/libc6-dev_2.2.5-11.5_mips.deb
stable/main/binary-mips/libc6-pic_2.2.5-11.5_mips.deb
stable/main/binary-mips/libc6-prof_2.2.5-11.5_mips.deb
stable/main/binary-mips/libc6-dbg_2.2.5-11.5_mips.deb
stable/main/binary-mips/libc6_2.2.5-11.5_mips.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-ia64/libc6.1-pic_2.2.5-11.5_ia64.deb
stable/main/binary-ia64/libc6.1-dev_2.2.5-11.5_ia64.deb
stable/main/binary-ia64/libc6.1-dbg_2.2.5-11.5_ia64.deb
stable/main/binary-ia64/libc6.1-prof_2.2.5-11.5_ia64.deb
stable/main/binary-ia64/libc6.1_2.2.5-11.5_ia64.deb
stable/main/binary-ia64/nscd_2.2.5-11.5_ia64.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-i386/libc6-dbg_2.2.5-11.5_i386.deb
stable/main/binary-i386/nscd_2.2.5-11.5_i386.deb
stable/main/binary-i386/libc6-pic_2.2.5-11.5_i386.deb
stable/main/binary-i386/libc6_2.2.5-11.5_i386.deb
stable/main/binary-i386/libc6-dev_2.2.5-11.5_i386.deb
stable/main/binary-i386/libc6-prof_2.2.5-11.5_i386.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-hppa/libc6-prof_2.2.5-11.5_hppa.deb
stable/main/binary-hppa/libc6_2.2.5-11.5_hppa.deb
stable/main/binary-hppa/libc6-dbg_2.2.5-11.5_hppa.deb
stable/main/binary-hppa/libc6-pic_2.2.5-11.5_hppa.deb
stable/main/binary-hppa/nscd_2.2.5-11.5_hppa.deb
stable/main/binary-hppa/libc6-dev_2.2.5-11.5_hppa.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-arm/libc6-prof_2.2.5-11.5_arm.deb
stable/main/binary-arm/libc6_2.2.5-11.5_arm.deb
stable/main/binary-arm/libc6-dev_2.2.5-11.5_arm.deb
stable/main/binary-arm/nscd_2.2.5-11.5_arm.deb
stable/main/binary-arm/libc6-dbg_2.2.5-11.5_arm.deb
stable/main/binary-arm/libc6-pic_2.2.5-11.5_arm.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-alpha/libc6.1-dbg_2.2.5-11.5_alpha.deb
stable/main/binary-alpha/libc6.1_2.2.5-11.5_alpha.deb
stable/main/binary-alpha/libc6.1-pic_2.2.5-11.5_alpha.deb
stable/main/binary-alpha/nscd_2.2.5-11.5_alpha.deb
stable/main/binary-alpha/libc6.1-prof_2.2.5-11.5_alpha.deb
stable/main/binary-alpha/libc6.1-dev_2.2.5-11.5_alpha.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/binary-m68k/libc6-dev_2.2.5-11.5_m68k.deb
stable/main/binary-m68k/libc6-prof_2.2.5-11.5_m68k.deb
stable/main/binary-m68k/libc6-pic_2.2.5-11.5_m68k.deb
stable/main/binary-m68k/libc6_2.2.5-11.5_m68k.deb
stable/main/binary-m68k/libc6-dbg_2.2.5-11.5_m68k.deb
stable/main/binary-m68k/nscd_2.2.5-11.5_m68k.deb
stable/main/binary-all/locales_2.2.5-11.5_all.deb
stable/main/source/glibc_2.2.5-11.5.dsc
stable/main/source/glibc_2.2.5-11.5.diff.gz
stable/main/binary-all/glibc-doc_2.2.5-11.5_all.deb
glibc (2.2.5-11.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Adjusted build dependencies once more, didn't know that I must not use
    a comma as separator, never fiddled with build-deps that much
    before.  *sigh*


stable/main/source/gallery_1.2.5-8woody1.dsc
stable/main/source/gallery_1.2.5-8woody1.diff.gz
stable/main/binary-all/gallery_1.2.5-8woody1_all.deb
gallery (1.2.5-8woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix cross-site scripting in searchstring parameter
    (CAN-2003-0614)
    [search.php]


stable/main/binary-sparc/fuzz_0.6-6woody1_sparc.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-s390/fuzz_0.6-6woody1_s390.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-powerpc/fuzz_0.6-6woody1_powerpc.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-mipsel/fuzz_0.6-6woody1_mipsel.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-mips/fuzz_0.6-6woody1_mips.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-m68k/fuzz_0.6-6woody1_m68k.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-ia64/fuzz_0.6-6woody1_ia64.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-hppa/fuzz_0.6-6woody1_hppa.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-arm/fuzz_0.6-6woody1_arm.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-alpha/fuzz_0.6-6woody1_alpha.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/source/fuzz_0.6-6woody1.diff.gz
stable/main/source/fuzz_0.6-6woody1.dsc
stable/main/binary-i386/fuzz_0.6-6woody1_i386.deb
fuzz (0.6-6woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Create temporary file securely using mkstemp (bug #183047)


stable/main/binary-alpha/ftape-util_1.09.2001.08.13-0.3_alpha.deb
ftape-tools (1:1.09.2001.08.13-0.3) unstable; urgency=low
  * Non-maintainer upload.
  * debian/control: Added `texinfo' to build dependencies.
    Closes: Bug#133562.


stable/main/binary-sparc/file_3.37-3.1.woody.1_sparc.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-s390/file_3.37-3.1.woody.1_s390.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-powerpc/file_3.37-3.1.woody.1_powerpc.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-mipsel/file_3.37-3.1.woody.1_mipsel.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-mips/file_3.37-3.1.woody.1_mips.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-m68k/file_3.37-3.1.woody.1_m68k.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-ia64/file_3.37-3.1.woody.1_ia64.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-i386/file_3.37-3.1.woody.1_i386.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-hppa/file_3.37-3.1.woody.1_hppa.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-arm/file_3.37-3.1.woody.1_arm.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-alpha/file_3.37-3.1.woody.1_alpha.deb
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/source/file_3.37-3.1.woody.1.dsc
stable/main/source/file_3.37-3.1.woody.1.diff.gz
file (3.37-3.1.woody.1) stable; urgency=high
  * [SECURITY] fix buffer overflow in readelf.c


stable/main/binary-s390/fetchmail-ssl_5.9.11-6.2_s390.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-powerpc/fetchmail-ssl_5.9.11-6.2_powerpc.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-mipsel/fetchmail-ssl_5.9.11-6.2_mipsel.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-mips/fetchmail-ssl_5.9.11-6.2_mips.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-m68k/fetchmail-ssl_5.9.11-6.2_m68k.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-ia64/fetchmail-ssl_5.9.11-6.2_ia64.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-i386/fetchmail-ssl_5.9.11-6.2_i386.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-hppa/fetchmail-ssl_5.9.11-6.2_hppa.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-arm/fetchmail-ssl_5.9.11-6.2_arm.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-alpha/fetchmail-ssl_5.9.11-6.2_alpha.deb
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-sparc/fetchmail-ssl_5.9.11-6.2_sparc.deb
stable/main/source/fetchmail-ssl_5.9.11-6.2.dsc
stable/main/source/fetchmail-ssl_5.9.11-6.2.diff.gz
fetchmail-ssl (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-s390/fetchmail_5.9.11-6.2_s390.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-powerpc/fetchmail_5.9.11-6.2_powerpc.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-mipsel/fetchmail_5.9.11-6.2_mipsel.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-mips/fetchmail_5.9.11-6.2_mips.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-m68k/fetchmail_5.9.11-6.2_m68k.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-ia64/fetchmail_5.9.11-6.2_ia64.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-i386/fetchmail_5.9.11-6.2_i386.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-hppa/fetchmail_5.9.11-6.2_hppa.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-arm/fetchmail_5.9.11-6.2_arm.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-alpha/fetchmail_5.9.11-6.2_alpha.deb
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/source/fetchmail_5.9.11-6.2.diff.gz
stable/main/binary-all/fetchmailconf_5.9.11-6.2_all.deb
stable/main/binary-sparc/fetchmail_5.9.11-6.2_sparc.deb
stable/main/binary-all/fetchmail-common_5.9.11-6.2_all.deb
stable/main/source/fetchmail_5.9.11-6.2.dsc
fetchmail (5.9.11-6.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied correction from Lukas Geyer to fix buffer overflow (CAN-2002-1365)


stable/main/binary-sparc/fdclone_2.00a-1woody3_sparc.deb
fdclone (2.00a-1woody3) stable-security; urgency=high
  * use random number instead of PID number for temporary directory
  * do check existence of the temporary directory
  * Closes: #182619
  * CAN-2003-0596


stable/main/binary-s390/fdclone_2.00a-1woody3_s390.deb
fdclone (2.00a-1woody3) stable-security; urgency=high
  * use random number instead of PID number for temporary directory
  * do check existence of the temporary directory
  * Closes: #182619
  * CAN-2003-0596


stable/main/binary-powerpc/fdclone_2.00a-1woody3_powerpc.deb
fdclone (2.00a-1woody3) stable-security; urgency=high
  * use random number instead of PID number for temporary directory
  * do check existence of the temporary directory
  * Closes: #182619
  * CAN-2003-0596


stable/main/binary-m68k/fdclone_2.00a-1woody3_m68k.deb
fdclone (2.00a-1woody3) stable-security; urgency=high
  * use random number instead of PID number for temporary directory
  * do check existence of the temporary directory
  * Closes: #182619
  * CAN-2003-0596


stable/main/binary-hppa/fdclone_2.00a-1woody3_hppa.deb
fdclone (2.00a-1woody3) stable-security; urgency=high
  * use random number instead of PID number for temporary directory
  * do check existence of the temporary directory
  * Closes: #182619
  * CAN-2003-0596


stable/main/binary-arm/fdclone_2.00a-1woody3_arm.deb
fdclone (2.00a-1woody3) stable-security; urgency=high
  * use random number instead of PID number for temporary directory
  * do check existence of the temporary directory
  * Closes: #182619
  * CAN-2003-0596


stable/main/binary-alpha/fdclone_2.00a-1woody3_alpha.deb
fdclone (2.00a-1woody3) stable-security; urgency=high
  * use random number instead of PID number for temporary directory
  * do check existence of the temporary directory
  * Closes: #182619
  * CAN-2003-0596


stable/main/source/fdclone_2.00a-1woody3.dsc
stable/main/binary-i386/fdclone_2.00a-1woody3_i386.deb
stable/main/source/fdclone_2.00a-1woody3.diff.gz
fdclone (2.00a-1woody3) stable-security; urgency=high
  * use random number instead of PID number for temporary directory
  * do check existence of the temporary directory
  * Closes: #182619
  * CAN-2003-0596


stable/main/binary-sparc/falconseye_1.9.3-7woody3_sparc.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-s390/falconseye_1.9.3-7woody3_s390.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-powerpc/falconseye_1.9.3-7woody3_powerpc.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-mipsel/falconseye_1.9.3-7woody3_mipsel.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-mips/falconseye_1.9.3-7woody3_mips.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-m68k/falconseye_1.9.3-7woody3_m68k.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-ia64/falconseye_1.9.3-7woody3_ia64.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-hppa/falconseye_1.9.3-7woody3_hppa.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-arm/falconseye_1.9.3-7woody3_arm.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-alpha/falconseye_1.9.3-7woody3_alpha.deb
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/source/falconseye_1.9.3-7woody3.dsc
stable/main/binary-i386/falconseye_1.9.3-7woody3_i386.deb
stable/main/binary-all/falconseye-data_1.9.3-7woody3_all.deb
stable/main/source/falconseye_1.9.3-7woody3.diff.gz
falconseye (1.9.3-7woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Re-target package from proposed-updates for stable-security
  * This fixed CAN-2003-0358


stable/main/binary-sparc/eximon_3.35-1woody2_sparc.deb
stable/main/binary-sparc/exim_3.35-1woody2_sparc.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-s390/eximon_3.35-1woody2_s390.deb
stable/main/binary-s390/exim_3.35-1woody2_s390.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-powerpc/eximon_3.35-1woody2_powerpc.deb
stable/main/binary-powerpc/exim_3.35-1woody2_powerpc.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-mipsel/exim_3.35-1woody2_mipsel.deb
stable/main/binary-mipsel/eximon_3.35-1woody2_mipsel.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-mips/eximon_3.35-1woody2_mips.deb
stable/main/binary-mips/exim_3.35-1woody2_mips.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-m68k/exim_3.35-1woody2_m68k.deb
stable/main/binary-m68k/eximon_3.35-1woody2_m68k.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-ia64/exim_3.35-1woody2_ia64.deb
stable/main/binary-ia64/eximon_3.35-1woody2_ia64.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-hppa/eximon_3.35-1woody2_hppa.deb
stable/main/binary-hppa/exim_3.35-1woody2_hppa.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-arm/exim_3.35-1woody2_arm.deb
stable/main/binary-arm/eximon_3.35-1woody2_arm.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-alpha/exim_3.35-1woody2_alpha.deb
stable/main/binary-alpha/eximon_3.35-1woody2_alpha.deb
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/source/exim_3.35-1woody2.diff.gz
stable/main/binary-i386/exim_3.35-1woody2_i386.deb
stable/main/binary-i386/eximon_3.35-1woody2_i386.deb
stable/main/source/exim_3.35-1woody2.dsc
exim (3.35-1woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix debian/rules to explicitly set permissions on installed documentation
    (including man pages)


stable/main/binary-sparc/ethereal-dev_0.9.4-1woody5_sparc.deb
stable/main/binary-sparc/ethereal-common_0.9.4-1woody5_sparc.deb
stable/main/binary-sparc/ethereal_0.9.4-1woody5_sparc.deb
stable/main/binary-sparc/tethereal_0.9.4-1woody5_sparc.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-s390/tethereal_0.9.4-1woody5_s390.deb
stable/main/binary-s390/ethereal_0.9.4-1woody5_s390.deb
stable/main/binary-s390/ethereal-dev_0.9.4-1woody5_s390.deb
stable/main/binary-s390/ethereal-common_0.9.4-1woody5_s390.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-powerpc/ethereal-dev_0.9.4-1woody5_powerpc.deb
stable/main/binary-powerpc/ethereal-common_0.9.4-1woody5_powerpc.deb
stable/main/binary-powerpc/ethereal_0.9.4-1woody5_powerpc.deb
stable/main/binary-powerpc/tethereal_0.9.4-1woody5_powerpc.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-mipsel/tethereal_0.9.4-1woody5_mipsel.deb
stable/main/binary-mipsel/ethereal-dev_0.9.4-1woody5_mipsel.deb
stable/main/binary-mipsel/ethereal-common_0.9.4-1woody5_mipsel.deb
stable/main/binary-mipsel/ethereal_0.9.4-1woody5_mipsel.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-mips/ethereal-dev_0.9.4-1woody5_mips.deb
stable/main/binary-mips/tethereal_0.9.4-1woody5_mips.deb
stable/main/binary-mips/ethereal_0.9.4-1woody5_mips.deb
stable/main/binary-mips/ethereal-common_0.9.4-1woody5_mips.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-m68k/ethereal_0.9.4-1woody5_m68k.deb
stable/main/binary-m68k/tethereal_0.9.4-1woody5_m68k.deb
stable/main/binary-m68k/ethereal-dev_0.9.4-1woody5_m68k.deb
stable/main/binary-m68k/ethereal-common_0.9.4-1woody5_m68k.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-ia64/tethereal_0.9.4-1woody5_ia64.deb
stable/main/binary-ia64/ethereal-dev_0.9.4-1woody5_ia64.deb
stable/main/binary-ia64/ethereal_0.9.4-1woody5_ia64.deb
stable/main/binary-ia64/ethereal-common_0.9.4-1woody5_ia64.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-hppa/ethereal-dev_0.9.4-1woody5_hppa.deb
stable/main/binary-hppa/ethereal-common_0.9.4-1woody5_hppa.deb
stable/main/binary-hppa/ethereal_0.9.4-1woody5_hppa.deb
stable/main/binary-hppa/tethereal_0.9.4-1woody5_hppa.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-arm/ethereal-common_0.9.4-1woody5_arm.deb
stable/main/binary-arm/ethereal_0.9.4-1woody5_arm.deb
stable/main/binary-arm/ethereal-dev_0.9.4-1woody5_arm.deb
stable/main/binary-arm/tethereal_0.9.4-1woody5_arm.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-alpha/tethereal_0.9.4-1woody5_alpha.deb
stable/main/binary-alpha/ethereal_0.9.4-1woody5_alpha.deb
stable/main/binary-alpha/ethereal-common_0.9.4-1woody5_alpha.deb
stable/main/binary-alpha/ethereal-dev_0.9.4-1woody5_alpha.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-i386/ethereal-common_0.9.4-1woody5_i386.deb
stable/main/source/ethereal_0.9.4-1woody5.diff.gz
stable/main/binary-i386/ethereal_0.9.4-1woody5_i386.deb
stable/main/source/ethereal_0.9.4-1woody5.dsc
stable/main/binary-i386/tethereal_0.9.4-1woody5_i386.deb
stable/main/binary-i386/ethereal-dev_0.9.4-1woody5_i386.deb
ethereal (0.9.4-1woody5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix vulnerabilities announced in enpa-sa-00010
    - throw an error on zero-length bufsize in tvb_get_nstringz0
      (CAN-2003-0431)
      [epan/tvbuff.c]
    - Fix over-allocation problem in DCERPC dissector
      (CAN-2003-0428)
      [packet-dcerpc-lsa.c]
    - Fix overflow with bad IPv4 or IPv6 prefix lengths
      (CAN-2003-0429)
      [packet-isis-lsp.c]
    - Use a slightly larger buffer in print_tsap
      (CAN-2003-0432)
      [packet-clnp.c]
    - Check snprintf return value correctly
      (CAN-2003-0432)
      [packet-isakmp.c, packet-wsp.c, packet-ieee80211.c, packet-dns.c]
    - Fix buffer overflows on szInfo buffer
      (CAN-2003-0432)
      [packet-wtp.c]
    - Use consistent buffer size for valString
      (CAN-2003-0432)
      [packet-wsp.c]
    - Use a GString to avoid all sorts of dangerous buffer handling
      with strcat, sprintf, strncpy
      (CAN-2003-0432)
      [packet-isis-clv.c, packet-dns.c, packet-bgp.c]


stable/main/binary-sparc/eterm_0.9.2-0pre2002042903.2_sparc.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-s390/eterm_0.9.2-0pre2002042903.2_s390.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-powerpc/eterm_0.9.2-0pre2002042903.2_powerpc.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-mipsel/eterm_0.9.2-0pre2002042903.2_mipsel.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-mips/eterm_0.9.2-0pre2002042903.2_mips.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-m68k/eterm_0.9.2-0pre2002042903.2_m68k.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-ia64/eterm_0.9.2-0pre2002042903.2_ia64.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-hppa/eterm_0.9.2-0pre2002042903.2_hppa.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-arm/eterm_0.9.2-0pre2002042903.2_arm.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-alpha/eterm_0.9.2-0pre2002042903.2_alpha.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/source/eterm_0.9.2-0pre2002042903.2.tar.gz
stable/main/source/eterm_0.9.2-0pre2002042903.2.dsc
stable/main/binary-i386/eterm_0.9.2-0pre2002042903.2_i386.deb
eterm (0.9.2-0pre2002042903.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a semantic error in the snprintf invocation introduced in the
    previous version


stable/main/binary-all/eroaster_2.1.0.0.3-2woody1_all.deb
stable/main/source/eroaster_2.1.0.0.3-2woody1.dsc
stable/main/source/eroaster_2.1.0.0.3-2woody1.diff.gz
eroaster (2.1.0.0.3-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Patch from maintainer to use a temporary file under $HOME, rather than in
    /tmp (CAN-2003-0656)


stable/main/binary-sparc/epic4_1.1.2.20020219-2.2_sparc.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-s390/epic4_1.1.2.20020219-2.2_s390.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-powerpc/epic4_1.1.2.20020219-2.2_powerpc.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-mipsel/epic4_1.1.2.20020219-2.2_mipsel.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-mips/epic4_1.1.2.20020219-2.2_mips.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-m68k/epic4_1.1.2.20020219-2.2_m68k.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-ia64/epic4_1.1.2.20020219-2.2_ia64.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-i386/epic4_1.1.2.20020219-2.2_i386.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-hppa/epic4_1.1.2.20020219-2.2_hppa.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-arm/epic4_1.1.2.20020219-2.2_arm.deb
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-alpha/epic4_1.1.2.20020219-2.2_alpha.deb
stable/main/source/epic4_1.1.2.20020219-2.2.dsc
stable/main/source/epic4_1.1.2.20020219-2.2.diff.gz
epic4 (1:1.1.2.20020219-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch by Jeremy Nelson <jnelson@prbh.org> to fix
    buffer overflow (source/ctcp.c,
    ftp://ftp.prbh.org/pub/epic/patches/alloca_underrun-patch-1)


stable/main/binary-s390/epic_3.004-17.1_s390.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-powerpc/epic_3.004-17.1_powerpc.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-mipsel/epic_3.004-17.1_mipsel.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-mips/epic_3.004-17.1_mips.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-m68k/epic_3.004-17.1_m68k.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-ia64/epic_3.004-17.1_ia64.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-i386/epic_3.004-17.1_i386.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-hppa/epic_3.004-17.1_hppa.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-arm/epic_3.004-17.1_arm.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-alpha/epic_3.004-17.1_alpha.deb
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/binary-sparc/epic_3.004-17.1_sparc.deb
stable/main/source/epic_3.004-17.1.dsc
stable/main/source/epic_3.004-17.1.diff.gz
epic (3.004-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream ircII patch partially to fix problems reported by
    Timo Sirainen <tss@iki.fi>
  * Added build dependencies


stable/main/source/eldav_0.0.20020411-1woody1.diff.gz
stable/main/binary-all/eldav_0.0.20020411-1woody1_all.deb
stable/main/source/eldav_0.0.20020411-1woody1.dsc
eldav (0.0.20020411-1woody1) stable-security; urgency=high
  * fix insecure tempfile handling (CAN-2003-0438)
  * backport make-temp-file from apel-10.5/poe.el


stable/main/binary-s390/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_s390.deb
stable/main/binary-s390/ecartis_0.129a+1.0.0-snap20020514-1.1_s390.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-powerpc/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_powerpc.deb
stable/main/binary-powerpc/ecartis_0.129a+1.0.0-snap20020514-1.1_powerpc.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-mipsel/ecartis_0.129a+1.0.0-snap20020514-1.1_mipsel.deb
stable/main/binary-mipsel/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_mipsel.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-mips/ecartis_0.129a+1.0.0-snap20020514-1.1_mips.deb
stable/main/binary-mips/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_mips.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-m68k/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_m68k.deb
stable/main/binary-m68k/ecartis_0.129a+1.0.0-snap20020514-1.1_m68k.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-ia64/ecartis_0.129a+1.0.0-snap20020514-1.1_ia64.deb
stable/main/binary-ia64/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_ia64.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-i386/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_i386.deb
stable/main/binary-i386/ecartis_0.129a+1.0.0-snap20020514-1.1_i386.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-hppa/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_hppa.deb
stable/main/binary-hppa/ecartis_0.129a+1.0.0-snap20020514-1.1_hppa.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-arm/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_arm.deb
stable/main/binary-arm/ecartis_0.129a+1.0.0-snap20020514-1.1_arm.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-alpha/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_alpha.deb
stable/main/binary-alpha/ecartis_0.129a+1.0.0-snap20020514-1.1_alpha.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/source/ecartis_0.129a+1.0.0-snap20020514-1.1.diff.gz
stable/main/binary-sparc/ecartis_0.129a+1.0.0-snap20020514-1.1_sparc.deb
stable/main/source/ecartis_0.129a+1.0.0-snap20020514-1.1.dsc
stable/main/binary-sparc/ecartis-cgi_0.129a+1.0.0-snap20020514-1.1_sparc.deb
ecartis (0.129a+1.0.0-snap20020514-1.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * [src/modules/lsg2/lsg2-main.c, templates/mainmenu.lsc]
    Apply fixes from ecartis CVS to fix password change
    vulnerability (#182786)


stable/main/binary-arm/dwww_1.7.6.woody.1_arm.deb
stable/main/binary-arm/realpath_1.7.6.woody.1_arm.deb
dwww (1.7.6.woody.1) woody-proposed-updates; urgency=low
  * Upload to woody, no changes in source.
    The current dwww version in woody is 1.7.4, but I'd like to see 1.7.6
    there: it has fixed a few of bugs and no new bug has been reported
    for 6 weeks. So it really is worth including in woody, I think.


stable/main/binary-powerpc/dietlibc-dev_0.12-2.5_powerpc.deb
dietlibc (0.12-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added upstream patch to fix integer overflows in XDR RPC library
    (CAN-2003-0028)


stable/main/binary-mipsel/dietlibc-dev_0.12-2.5_mipsel.deb
dietlibc (0.12-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added upstream patch to fix integer overflows in XDR RPC library
    (CAN-2003-0028)


stable/main/binary-mips/dietlibc-dev_0.12-2.5_mips.deb
dietlibc (0.12-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added upstream patch to fix integer overflows in XDR RPC library
    (CAN-2003-0028)


stable/main/binary-i386/dietlibc-dev_0.12-2.5_i386.deb
dietlibc (0.12-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added upstream patch to fix integer overflows in XDR RPC library
    (CAN-2003-0028)


stable/main/binary-arm/dietlibc-dev_0.12-2.5_arm.deb
dietlibc (0.12-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added upstream patch to fix integer overflows in XDR RPC library
    (CAN-2003-0028)


stable/main/binary-alpha/dietlibc-dev_0.12-2.5_alpha.deb
dietlibc (0.12-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added upstream patch to fix integer overflows in XDR RPC library
    (CAN-2003-0028)


stable/main/source/dietlibc_0.12-2.5.diff.gz
stable/main/binary-sparc/dietlibc-dev_0.12-2.5_sparc.deb
stable/main/binary-all/dietlibc-doc_0.12-2.5_all.deb
stable/main/source/dietlibc_0.12-2.5.dsc
dietlibc (0.12-2.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added upstream patch to fix integer overflows in XDR RPC library
    (CAN-2003-0028)


stable/main/binary-s390/dhcp3-dev_3.0+3.0.1rc9-2.2_s390.deb
stable/main/binary-s390/dhcp3-server_3.0+3.0.1rc9-2.2_s390.deb
stable/main/binary-s390/dhcp3-relay_3.0+3.0.1rc9-2.2_s390.deb
stable/main/binary-s390/dhcp3-common_3.0+3.0.1rc9-2.2_s390.deb
stable/main/binary-s390/dhcp3-client_3.0+3.0.1rc9-2.2_s390.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-powerpc/dhcp3-common_3.0+3.0.1rc9-2.2_powerpc.deb
stable/main/binary-powerpc/dhcp3-client_3.0+3.0.1rc9-2.2_powerpc.deb
stable/main/binary-powerpc/dhcp3-relay_3.0+3.0.1rc9-2.2_powerpc.deb
stable/main/binary-powerpc/dhcp3-server_3.0+3.0.1rc9-2.2_powerpc.deb
stable/main/binary-powerpc/dhcp3-dev_3.0+3.0.1rc9-2.2_powerpc.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-mipsel/dhcp3-dev_3.0+3.0.1rc9-2.2_mipsel.deb
stable/main/binary-mipsel/dhcp3-server_3.0+3.0.1rc9-2.2_mipsel.deb
stable/main/binary-mipsel/dhcp3-relay_3.0+3.0.1rc9-2.2_mipsel.deb
stable/main/binary-mipsel/dhcp3-common_3.0+3.0.1rc9-2.2_mipsel.deb
stable/main/binary-mipsel/dhcp3-client_3.0+3.0.1rc9-2.2_mipsel.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-mips/dhcp3-common_3.0+3.0.1rc9-2.2_mips.deb
stable/main/binary-mips/dhcp3-relay_3.0+3.0.1rc9-2.2_mips.deb
stable/main/binary-mips/dhcp3-server_3.0+3.0.1rc9-2.2_mips.deb
stable/main/binary-mips/dhcp3-dev_3.0+3.0.1rc9-2.2_mips.deb
stable/main/binary-mips/dhcp3-client_3.0+3.0.1rc9-2.2_mips.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-m68k/dhcp3-server_3.0+3.0.1rc9-2.2_m68k.deb
stable/main/binary-m68k/dhcp3-relay_3.0+3.0.1rc9-2.2_m68k.deb
stable/main/binary-m68k/dhcp3-common_3.0+3.0.1rc9-2.2_m68k.deb
stable/main/binary-m68k/dhcp3-client_3.0+3.0.1rc9-2.2_m68k.deb
stable/main/binary-m68k/dhcp3-dev_3.0+3.0.1rc9-2.2_m68k.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-ia64/dhcp3-dev_3.0+3.0.1rc9-2.2_ia64.deb
stable/main/binary-ia64/dhcp3-client_3.0+3.0.1rc9-2.2_ia64.deb
stable/main/binary-ia64/dhcp3-relay_3.0+3.0.1rc9-2.2_ia64.deb
stable/main/binary-ia64/dhcp3-common_3.0+3.0.1rc9-2.2_ia64.deb
stable/main/binary-ia64/dhcp3-server_3.0+3.0.1rc9-2.2_ia64.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-i386/dhcp3-client_3.0+3.0.1rc9-2.2_i386.deb
stable/main/binary-i386/dhcp3-dev_3.0+3.0.1rc9-2.2_i386.deb
stable/main/binary-i386/dhcp3-server_3.0+3.0.1rc9-2.2_i386.deb
stable/main/binary-i386/dhcp3-relay_3.0+3.0.1rc9-2.2_i386.deb
stable/main/binary-i386/dhcp3-common_3.0+3.0.1rc9-2.2_i386.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-hppa/dhcp3-dev_3.0+3.0.1rc9-2.2_hppa.deb
stable/main/binary-hppa/dhcp3-server_3.0+3.0.1rc9-2.2_hppa.deb
stable/main/binary-hppa/dhcp3-relay_3.0+3.0.1rc9-2.2_hppa.deb
stable/main/binary-hppa/dhcp3-common_3.0+3.0.1rc9-2.2_hppa.deb
stable/main/binary-hppa/dhcp3-client_3.0+3.0.1rc9-2.2_hppa.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-arm/dhcp3-server_3.0+3.0.1rc9-2.2_arm.deb
stable/main/binary-arm/dhcp3-dev_3.0+3.0.1rc9-2.2_arm.deb
stable/main/binary-arm/dhcp3-relay_3.0+3.0.1rc9-2.2_arm.deb
stable/main/binary-arm/dhcp3-client_3.0+3.0.1rc9-2.2_arm.deb
stable/main/binary-arm/dhcp3-common_3.0+3.0.1rc9-2.2_arm.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-alpha/dhcp3-server_3.0+3.0.1rc9-2.2_alpha.deb
stable/main/binary-alpha/dhcp3-relay_3.0+3.0.1rc9-2.2_alpha.deb
stable/main/binary-alpha/dhcp3-client_3.0+3.0.1rc9-2.2_alpha.deb
stable/main/binary-alpha/dhcp3-dev_3.0+3.0.1rc9-2.2_alpha.deb
stable/main/binary-alpha/dhcp3-common_3.0+3.0.1rc9-2.2_alpha.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-sparc/dhcp3-relay_3.0+3.0.1rc9-2.2_sparc.deb
stable/main/source/dhcp3_3.0+3.0.1rc9-2.2.dsc
stable/main/binary-sparc/dhcp3-server_3.0+3.0.1rc9-2.2_sparc.deb
stable/main/source/dhcp3_3.0+3.0.1rc9-2.2.diff.gz
stable/main/binary-sparc/dhcp3-common_3.0+3.0.1rc9-2.2_sparc.deb
stable/main/binary-sparc/dhcp3-dev_3.0+3.0.1rc9-2.2_sparc.deb
stable/main/binary-sparc/dhcp3-client_3.0+3.0.1rc9-2.2_sparc.deb
dhcp3 (3.0+3.0.1rc9-2.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Applied patch from Florian Lohoff to prevent packet storm attack of
    the DHCP infrastructure after a malicious BOOTP packet.


stable/main/binary-sparc/debianutils_1.16.2woody1_sparc.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-s390/debianutils_1.16.2woody1_s390.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-powerpc/debianutils_1.16.2woody1_powerpc.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-mipsel/debianutils_1.16.2woody1_mipsel.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-mips/debianutils_1.16.2woody1_mips.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-m68k/debianutils_1.16.2woody1_m68k.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-ia64/debianutils_1.16.2woody1_ia64.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-i386/debianutils_1.16.2woody1_i386.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-hppa/debianutils_1.16.2woody1_hppa.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-arm/debianutils_1.16.2woody1_arm.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/binary-alpha/debianutils_1.16.2woody1_alpha.deb
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/source/debianutils_1.16.2woody1.tar.gz
stable/main/source/debianutils_1.16.2woody1.dsc
debianutils (1.16.2woody1) stable; urgency=high
  * Backport of Ian Zimmerman's run-parts program output loss
    patch, which fixes zombie problem.  closes: #184710.


stable/main/source/ddskk_11.6.rel.0-2woody1.dsc
stable/main/source/ddskk_11.6.rel.0-2woody1.diff.gz
stable/main/binary-all/ddskk_11.6.rel.0-2woody1_all.deb
ddskk (11.6.rel.0-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Takao Kawamura <kawamura@debian.org> to create temporary
    files safely


stable/main/binary-all/dbishell_0.8.9-2woody1_all.deb
stable/main/source/dbishell_0.8.9-2woody1.diff.gz
stable/main/source/dbishell_0.8.9-2woody1.dsc
dbishell (0.8.9-2woody1) stable; urgency=low
  * work around xterm feature disabled in DSA 380-1 that we used.
    Without this change, we lose the ability to run inside xterms
    after DSA 380-1 is dealt with on a system.


stable/main/binary-s390/cyrus-common_1.5.19-9.1_s390.deb
stable/main/binary-s390/cyrus-pop3d_1.5.19-9.1_s390.deb
stable/main/binary-s390/cyrus-admin_1.5.19-9.1_s390.deb
stable/main/binary-s390/cyrus-imapd_1.5.19-9.1_s390.deb
stable/main/binary-s390/cyrus-nntp_1.5.19-9.1_s390.deb
stable/main/binary-s390/cyrus-dev_1.5.19-9.1_s390.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-powerpc/cyrus-dev_1.5.19-9.1_powerpc.deb
stable/main/binary-powerpc/cyrus-common_1.5.19-9.1_powerpc.deb
stable/main/binary-powerpc/cyrus-pop3d_1.5.19-9.1_powerpc.deb
stable/main/binary-powerpc/cyrus-imapd_1.5.19-9.1_powerpc.deb
stable/main/binary-powerpc/cyrus-admin_1.5.19-9.1_powerpc.deb
stable/main/binary-powerpc/cyrus-nntp_1.5.19-9.1_powerpc.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-mipsel/cyrus-imapd_1.5.19-9.1_mipsel.deb
stable/main/binary-mipsel/cyrus-admin_1.5.19-9.1_mipsel.deb
stable/main/binary-mipsel/cyrus-nntp_1.5.19-9.1_mipsel.deb
stable/main/binary-mipsel/cyrus-pop3d_1.5.19-9.1_mipsel.deb
stable/main/binary-mipsel/cyrus-dev_1.5.19-9.1_mipsel.deb
stable/main/binary-mipsel/cyrus-common_1.5.19-9.1_mipsel.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-mips/cyrus-pop3d_1.5.19-9.1_mips.deb
stable/main/binary-mips/cyrus-dev_1.5.19-9.1_mips.deb
stable/main/binary-mips/cyrus-admin_1.5.19-9.1_mips.deb
stable/main/binary-mips/cyrus-imapd_1.5.19-9.1_mips.deb
stable/main/binary-mips/cyrus-common_1.5.19-9.1_mips.deb
stable/main/binary-mips/cyrus-nntp_1.5.19-9.1_mips.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-m68k/cyrus-imapd_1.5.19-9.1_m68k.deb
stable/main/binary-m68k/cyrus-nntp_1.5.19-9.1_m68k.deb
stable/main/binary-m68k/cyrus-dev_1.5.19-9.1_m68k.deb
stable/main/binary-m68k/cyrus-admin_1.5.19-9.1_m68k.deb
stable/main/binary-m68k/cyrus-pop3d_1.5.19-9.1_m68k.deb
stable/main/binary-m68k/cyrus-common_1.5.19-9.1_m68k.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-ia64/cyrus-common_1.5.19-9.1_ia64.deb
stable/main/binary-ia64/cyrus-admin_1.5.19-9.1_ia64.deb
stable/main/binary-ia64/cyrus-dev_1.5.19-9.1_ia64.deb
stable/main/binary-ia64/cyrus-pop3d_1.5.19-9.1_ia64.deb
stable/main/binary-ia64/cyrus-imapd_1.5.19-9.1_ia64.deb
stable/main/binary-ia64/cyrus-nntp_1.5.19-9.1_ia64.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-i386/cyrus-nntp_1.5.19-9.1_i386.deb
stable/main/binary-i386/cyrus-common_1.5.19-9.1_i386.deb
stable/main/binary-i386/cyrus-dev_1.5.19-9.1_i386.deb
stable/main/binary-i386/cyrus-admin_1.5.19-9.1_i386.deb
stable/main/binary-i386/cyrus-pop3d_1.5.19-9.1_i386.deb
stable/main/binary-i386/cyrus-imapd_1.5.19-9.1_i386.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-hppa/cyrus-pop3d_1.5.19-9.1_hppa.deb
stable/main/binary-hppa/cyrus-common_1.5.19-9.1_hppa.deb
stable/main/binary-hppa/cyrus-imapd_1.5.19-9.1_hppa.deb
stable/main/binary-hppa/cyrus-admin_1.5.19-9.1_hppa.deb
stable/main/binary-hppa/cyrus-nntp_1.5.19-9.1_hppa.deb
stable/main/binary-hppa/cyrus-dev_1.5.19-9.1_hppa.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-arm/cyrus-nntp_1.5.19-9.1_arm.deb
stable/main/binary-arm/cyrus-common_1.5.19-9.1_arm.deb
stable/main/binary-arm/cyrus-dev_1.5.19-9.1_arm.deb
stable/main/binary-arm/cyrus-imapd_1.5.19-9.1_arm.deb
stable/main/binary-arm/cyrus-admin_1.5.19-9.1_arm.deb
stable/main/binary-arm/cyrus-pop3d_1.5.19-9.1_arm.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-alpha/cyrus-admin_1.5.19-9.1_alpha.deb
stable/main/binary-alpha/cyrus-imapd_1.5.19-9.1_alpha.deb
stable/main/binary-alpha/cyrus-common_1.5.19-9.1_alpha.deb
stable/main/binary-alpha/cyrus-dev_1.5.19-9.1_alpha.deb
stable/main/binary-alpha/cyrus-pop3d_1.5.19-9.1_alpha.deb
stable/main/binary-alpha/cyrus-nntp_1.5.19-9.1_alpha.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-sparc/cyrus-nntp_1.5.19-9.1_sparc.deb
stable/main/binary-sparc/cyrus-pop3d_1.5.19-9.1_sparc.deb
stable/main/binary-sparc/cyrus-admin_1.5.19-9.1_sparc.deb
stable/main/source/cyrus-imapd_1.5.19-9.1.diff.gz
stable/main/binary-sparc/cyrus-dev_1.5.19-9.1_sparc.deb
stable/main/source/cyrus-imapd_1.5.19-9.1.dsc
stable/main/binary-sparc/cyrus-common_1.5.19-9.1_sparc.deb
stable/main/binary-sparc/cyrus-imapd_1.5.19-9.1_sparc.deb
cyrus-imapd (1.5.19-9.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Timo Sirainen to fix pre-login buffer overflow
    (CAN-2002-0379)
  * Added --without-krb to configure options so the build doesn't stomp
    over missing Kerberos libraries


stable/main/binary-s390/cvs_1.11.1p1debian-8.1_s390.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-powerpc/cvs_1.11.1p1debian-8.1_powerpc.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-mipsel/cvs_1.11.1p1debian-8.1_mipsel.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-mips/cvs_1.11.1p1debian-8.1_mips.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-m68k/cvs_1.11.1p1debian-8.1_m68k.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-ia64/cvs_1.11.1p1debian-8.1_ia64.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-i386/cvs_1.11.1p1debian-8.1_i386.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-hppa/cvs_1.11.1p1debian-8.1_hppa.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-arm/cvs_1.11.1p1debian-8.1_arm.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-alpha/cvs_1.11.1p1debian-8.1_alpha.deb
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/source/cvs_1.11.1p1debian-8.1.diff.gz
stable/main/binary-sparc/cvs_1.11.1p1debian-8.1_sparc.deb
stable/main/source/cvs_1.11.1p1debian-8.1.dsc
cvs (1.11.1p1debian-8.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied patch from Stefan Esser to fix double-free problem


stable/main/binary-sparc/cupsys-pstoraster_1.1.14-5_sparc.deb
stable/main/binary-sparc/libcupsys2-dev_1.1.14-5_sparc.deb
stable/main/binary-sparc/cupsys-client_1.1.14-5_sparc.deb
stable/main/binary-sparc/libcupsys2_1.1.14-5_sparc.deb
stable/main/binary-sparc/cupsys-bsd_1.1.14-5_sparc.deb
stable/main/binary-sparc/cupsys_1.1.14-5_sparc.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/binary-s390/cupsys-pstoraster_1.1.14-5_s390.deb
stable/main/binary-s390/cupsys-client_1.1.14-5_s390.deb
stable/main/binary-s390/cupsys-bsd_1.1.14-5_s390.deb
stable/main/binary-s390/libcupsys2_1.1.14-5_s390.deb
stable/main/binary-s390/libcupsys2-dev_1.1.14-5_s390.deb
stable/main/binary-s390/cupsys_1.1.14-5_s390.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/binary-powerpc/libcupsys2_1.1.14-5_powerpc.deb
stable/main/binary-powerpc/cupsys-bsd_1.1.14-5_powerpc.deb
stable/main/binary-powerpc/cupsys-client_1.1.14-5_powerpc.deb
stable/main/binary-powerpc/libcupsys2-dev_1.1.14-5_powerpc.deb
stable/main/binary-powerpc/cupsys-pstoraster_1.1.14-5_powerpc.deb
stable/main/binary-powerpc/cupsys_1.1.14-5_powerpc.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/binary-mipsel/cupsys-bsd_1.1.14-5_mipsel.deb
stable/main/binary-mipsel/libcupsys2-dev_1.1.14-5_mipsel.deb
stable/main/binary-mipsel/cupsys-pstoraster_1.1.14-5_mipsel.deb
stable/main/binary-mipsel/cupsys_1.1.14-5_mipsel.deb
stable/main/binary-mipsel/cupsys-client_1.1.14-5_mipsel.deb
stable/main/binary-mipsel/libcupsys2_1.1.14-5_mipsel.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/binary-mips/cupsys-pstoraster_1.1.14-5_mips.deb
stable/main/binary-mips/cupsys-bsd_1.1.14-5_mips.deb
stable/main/binary-mips/cupsys-client_1.1.14-5_mips.deb
stable/main/binary-mips/libcupsys2-dev_1.1.14-5_mips.deb
stable/main/binary-mips/libcupsys2_1.1.14-5_mips.deb
stable/main/binary-mips/cupsys_1.1.14-5_mips.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/binary-m68k/cupsys-client_1.1.14-5_m68k.deb
stable/main/binary-m68k/libcupsys2_1.1.14-5_m68k.deb
stable/main/binary-m68k/libcupsys2-dev_1.1.14-5_m68k.deb
stable/main/binary-m68k/cupsys-bsd_1.1.14-5_m68k.deb
stable/main/binary-m68k/cupsys-pstoraster_1.1.14-5_m68k.deb
stable/main/binary-m68k/cupsys_1.1.14-5_m68k.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/binary-ia64/cupsys-pstoraster_1.1.14-5_ia64.deb
stable/main/binary-ia64/cupsys_1.1.14-5_ia64.deb
stable/main/binary-ia64/cupsys-client_1.1.14-5_ia64.deb
stable/main/binary-ia64/cupsys-bsd_1.1.14-5_ia64.deb
stable/main/binary-ia64/libcupsys2-dev_1.1.14-5_ia64.deb
stable/main/binary-ia64/libcupsys2_1.1.14-5_ia64.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/binary-hppa/libcupsys2_1.1.14-5_hppa.deb
stable/main/binary-hppa/cupsys-client_1.1.14-5_hppa.deb
stable/main/binary-hppa/cupsys_1.1.14-5_hppa.deb
stable/main/binary-hppa/cupsys-pstoraster_1.1.14-5_hppa.deb
stable/main/binary-hppa/cupsys-bsd_1.1.14-5_hppa.deb
stable/main/binary-hppa/libcupsys2-dev_1.1.14-5_hppa.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/binary-arm/libcupsys2_1.1.14-5_arm.deb
stable/main/binary-arm/cupsys-client_1.1.14-5_arm.deb
stable/main/binary-arm/cupsys-bsd_1.1.14-5_arm.deb
stable/main/binary-arm/libcupsys2-dev_1.1.14-5_arm.deb
stable/main/binary-arm/cupsys-pstoraster_1.1.14-5_arm.deb
stable/main/binary-arm/cupsys_1.1.14-5_arm.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/binary-alpha/libcupsys2-dev_1.1.14-5_alpha.deb
stable/main/binary-alpha/cupsys-bsd_1.1.14-5_alpha.deb
stable/main/binary-alpha/cupsys-client_1.1.14-5_alpha.deb
stable/main/binary-alpha/libcupsys2_1.1.14-5_alpha.deb
stable/main/binary-alpha/cupsys-pstoraster_1.1.14-5_alpha.deb
stable/main/binary-alpha/cupsys_1.1.14-5_alpha.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/source/cupsys_1.1.14-5.diff.gz
stable/main/binary-i386/cupsys-bsd_1.1.14-5_i386.deb
stable/main/binary-i386/cupsys_1.1.14-5_i386.deb
stable/main/binary-i386/libcupsys2-dev_1.1.14-5_i386.deb
stable/main/binary-i386/cupsys-client_1.1.14-5_i386.deb
stable/main/source/cupsys_1.1.14-5.dsc
stable/main/binary-i386/cupsys-pstoraster_1.1.14-5_i386.deb
stable/main/binary-i386/libcupsys2_1.1.14-5_i386.deb
cupsys (1.1.14-5) stable-security; urgency=high
  * Security fix: prevent denial of service by not freezing when an
    HTTP transaction is improperly terminated.
  * Fix Build-Depends to make sure that PAM support is always available.
  * CAN-2003-0195


stable/main/source/console-data_1999.08.29-24.2.diff.gz
stable/main/binary-all/console-data_1999.08.29-24.2_all.deb
stable/main/source/console-data_1999.08.29-24.2.dsc
console-data (1999.08.29-24.2) stable; urgency=low
  * Fix depends to work properly on woody. Closes: #201659.
  * Change maintainer.


stable/main/binary-sparc/colrconv_0.99.2-8_sparc.deb
colrconv (0.99.2-8) unstable; urgency=low
  * Remove libc6-dev from Build-Depends line as per debian policy.


stable/main/binary-s390/colrconv_0.99.2-8_s390.deb
colrconv (0.99.2-8) unstable; urgency=low
  * Remove libc6-dev from Build-Depends line as per debian policy.


stable/main/binary-powerpc/colrconv_0.99.2-8_powerpc.deb
colrconv (0.99.2-8) unstable; urgency=low
  * Remove libc6-dev from Build-Depends line as per debian policy.


stable/main/binary-mipsel/colrconv_0.99.2-8_mipsel.deb
colrconv (0.99.2-8) unstable; urgency=low
  * Remove libc6-dev from Build-Depends line as per debian policy.


stable/main/binary-mips/colrconv_0.99.2-8_mips.deb
colrconv (0.99.2-8) unstable; urgency=low
  * Remove libc6-dev from Build-Depends line as per debian policy.


stable/main/binary-m68k/colrconv_0.99.2-8_m68k.deb
colrconv (0.99.2-8) unstable; urgency=low
  * Remove libc6-dev from Build-Depends line as per debian policy.


stable/main/binary-ia64/colrconv_0.99.2-8_ia64.deb
colrconv (0.99.2-8) unstable; urgency=low
  * Remove libc6-dev from Build-Depends line as per debian policy.


stable/main/binary-hppa/colrconv_0.99.2-8_hppa.deb
colrconv (0.99.2-8) unstable; urgency=low
  * Remove libc6-dev from Build-Depends line as per debian policy.


stable/main/binary-arm/colrconv_0.99.2-8_arm.deb
colrconv (0.99.2-8) unstable; urgency=low
  * Remove libc6-dev from Build-Depends line as per debian policy.


stable/main/binary-s390/canna-utils_3.5b2-46.2_s390.deb
stable/main/binary-s390/canna_3.5b2-46.2_s390.deb
stable/main/binary-s390/libcanna1g_3.5b2-46.2_s390.deb
stable/main/binary-s390/libcanna1g-dev_3.5b2-46.2_s390.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-powerpc/canna_3.5b2-46.2_powerpc.deb
stable/main/binary-powerpc/libcanna1g-dev_3.5b2-46.2_powerpc.deb
stable/main/binary-powerpc/canna-utils_3.5b2-46.2_powerpc.deb
stable/main/binary-powerpc/libcanna1g_3.5b2-46.2_powerpc.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-mipsel/libcanna1g-dev_3.5b2-46.2_mipsel.deb
stable/main/binary-mipsel/canna_3.5b2-46.2_mipsel.deb
stable/main/binary-mipsel/canna-utils_3.5b2-46.2_mipsel.deb
stable/main/binary-mipsel/libcanna1g_3.5b2-46.2_mipsel.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-mips/libcanna1g_3.5b2-46.2_mips.deb
stable/main/binary-mips/libcanna1g-dev_3.5b2-46.2_mips.deb
stable/main/binary-mips/canna-utils_3.5b2-46.2_mips.deb
stable/main/binary-mips/canna_3.5b2-46.2_mips.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-m68k/libcanna1g_3.5b2-46.2_m68k.deb
stable/main/binary-m68k/libcanna1g-dev_3.5b2-46.2_m68k.deb
stable/main/binary-m68k/canna_3.5b2-46.2_m68k.deb
stable/main/binary-m68k/canna-utils_3.5b2-46.2_m68k.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-ia64/libcanna1g-dev_3.5b2-46.2_ia64.deb
stable/main/binary-ia64/canna_3.5b2-46.2_ia64.deb
stable/main/binary-ia64/canna-utils_3.5b2-46.2_ia64.deb
stable/main/binary-ia64/libcanna1g_3.5b2-46.2_ia64.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-i386/canna_3.5b2-46.2_i386.deb
stable/main/binary-i386/canna-utils_3.5b2-46.2_i386.deb
stable/main/binary-i386/libcanna1g_3.5b2-46.2_i386.deb
stable/main/binary-i386/libcanna1g-dev_3.5b2-46.2_i386.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-hppa/libcanna1g-dev_3.5b2-46.2_hppa.deb
stable/main/binary-hppa/libcanna1g_3.5b2-46.2_hppa.deb
stable/main/binary-hppa/canna-utils_3.5b2-46.2_hppa.deb
stable/main/binary-hppa/canna_3.5b2-46.2_hppa.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-arm/canna_3.5b2-46.2_arm.deb
stable/main/binary-arm/canna-utils_3.5b2-46.2_arm.deb
stable/main/binary-arm/libcanna1g-dev_3.5b2-46.2_arm.deb
stable/main/binary-arm/libcanna1g_3.5b2-46.2_arm.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-alpha/libcanna1g_3.5b2-46.2_alpha.deb
stable/main/binary-alpha/canna-utils_3.5b2-46.2_alpha.deb
stable/main/binary-alpha/canna_3.5b2-46.2_alpha.deb
stable/main/binary-alpha/libcanna1g-dev_3.5b2-46.2_alpha.deb
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/binary-sparc/libcanna1g-dev_3.5b2-46.2_sparc.deb
stable/main/binary-sparc/canna-utils_3.5b2-46.2_sparc.deb
stable/main/binary-sparc/canna_3.5b2-46.2_sparc.deb
stable/main/source/canna_3.5b2-46.2.diff.gz
stable/main/binary-sparc/libcanna1g_3.5b2-46.2_sparc.deb
stable/main/source/canna_3.5b2-46.2.dsc
canna (3.5b2-46.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied upstream patch to fix buffer overflows (CAN-2002-1158) and
    invalidate requests (CAN-2002-1159)
  * Used .2 since .1 was probably burnt and the buildd network has
    probably recorded the version string.


stable/main/source/bugzilla_2.14.2-0woody4.diff.gz
stable/main/source/bugzilla_2.14.2-0woody4.dsc
stable/main/binary-all/bugzilla-doc_2.14.2-0woody4_all.deb
stable/main/binary-all/bugzilla_2.14.2-0woody4_all.deb
bugzilla (2.14.2-0woody4) stable-security; urgency=low
  * Non-maintainer upload by the security team
  * Apply upstream's fixes for two security bugs
    - collectstats.pl setting world-writable permissions
      http://bugzilla.mozilla.org/show_bug.cgi?id=183188
    - Checksetup leaves editor backups of localconfig accessible
      http://bugzilla.mozilla.org/show_bug.cgi?id=186383


stable/main/binary-sparc/bind-dev_8.3.3-2.0woody1_sparc.deb
stable/main/binary-sparc/bind_8.3.3-2.0woody1_sparc.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-s390/bind_8.3.3-2.0woody1_s390.deb
stable/main/binary-s390/bind-dev_8.3.3-2.0woody1_s390.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-powerpc/bind-dev_8.3.3-2.0woody1_powerpc.deb
stable/main/binary-powerpc/bind_8.3.3-2.0woody1_powerpc.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-mipsel/bind_8.3.3-2.0woody1_mipsel.deb
stable/main/binary-mipsel/bind-dev_8.3.3-2.0woody1_mipsel.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-mips/bind_8.3.3-2.0woody1_mips.deb
stable/main/binary-mips/bind-dev_8.3.3-2.0woody1_mips.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-m68k/bind-dev_8.3.3-2.0woody1_m68k.deb
stable/main/binary-m68k/bind_8.3.3-2.0woody1_m68k.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-ia64/bind_8.3.3-2.0woody1_ia64.deb
stable/main/binary-ia64/bind-dev_8.3.3-2.0woody1_ia64.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-hppa/bind_8.3.3-2.0woody1_hppa.deb
stable/main/binary-hppa/bind-dev_8.3.3-2.0woody1_hppa.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-arm/bind_8.3.3-2.0woody1_arm.deb
stable/main/binary-arm/bind-dev_8.3.3-2.0woody1_arm.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-alpha/bind_8.3.3-2.0woody1_alpha.deb
stable/main/binary-alpha/bind-dev_8.3.3-2.0woody1_alpha.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/source/bind_8.3.3-2.0woody1.dsc
stable/main/binary-i386/bind_8.3.3-2.0woody1_i386.deb
stable/main/binary-i386/bind-dev_8.3.3-2.0woody1_i386.deb
stable/main/source/bind_8.3.3-2.0woody1.diff.gz
stable/main/binary-all/bind-doc_8.3.3-2.0woody1_all.deb
bind (1:8.3.3-2.0woody1) stable-security; urgency=low
  * Non-maintainer upload by the Security Team.
  * Include patches for CERT VU#852283 and VU#229595.


stable/main/binary-sparc/balsa_1.2.4-2.2_sparc.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-s390/balsa_1.2.4-2.2_s390.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-powerpc/balsa_1.2.4-2.2_powerpc.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-mipsel/balsa_1.2.4-2.2_mipsel.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-mips/balsa_1.2.4-2.2_mips.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-m68k/balsa_1.2.4-2.2_m68k.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-ia64/balsa_1.2.4-2.2_ia64.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-i386/balsa_1.2.4-2.2_i386.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-hppa/balsa_1.2.4-2.2_hppa.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/binary-arm/balsa_1.2.4-2.2_arm.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/main/source/balsa_1.2.4-2.2.diff.gz
stable/main/source/balsa_1.2.4-2.2.dsc
stable/main/binary-alpha/balsa_1.2.4-2.2_alpha.deb
balsa (1.2.4-2.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mips and mipsel buildd
    being unable to build this package.


stable/contrib/binary-sparc/autorespond_2.0.2-2woody1_sparc.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-s390/autorespond_2.0.2-2woody1_s390.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-powerpc/autorespond_2.0.2-2woody1_powerpc.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-mipsel/autorespond_2.0.2-2woody1_mipsel.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-mips/autorespond_2.0.2-2woody1_mips.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-m68k/autorespond_2.0.2-2woody1_m68k.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-ia64/autorespond_2.0.2-2woody1_ia64.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-hppa/autorespond_2.0.2-2woody1_hppa.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-arm/autorespond_2.0.2-2woody1_arm.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-alpha/autorespond_2.0.2-2woody1_alpha.deb
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/contrib/binary-i386/autorespond_2.0.2-2woody1_i386.deb
stable/contrib/source/autorespond_2.0.2-2woody1.dsc
stable/contrib/source/autorespond_2.0.2-2woody1.diff.gz
autorespond (2.0.2-2woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow with EXT and HOST environment variables
    (CAN-2003-0654)


stable/main/binary-sparc/atftp_0.6.0woody1_sparc.deb
stable/main/binary-sparc/atftpd_0.6.0woody1_sparc.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-s390/atftpd_0.6.0woody1_s390.deb
stable/main/binary-s390/atftp_0.6.0woody1_s390.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-powerpc/atftpd_0.6.0woody1_powerpc.deb
stable/main/binary-powerpc/atftp_0.6.0woody1_powerpc.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-mipsel/atftpd_0.6.0woody1_mipsel.deb
stable/main/binary-mipsel/atftp_0.6.0woody1_mipsel.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-mips/atftpd_0.6.0woody1_mips.deb
stable/main/binary-mips/atftp_0.6.0woody1_mips.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-m68k/atftp_0.6.0woody1_m68k.deb
stable/main/binary-m68k/atftpd_0.6.0woody1_m68k.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-ia64/atftpd_0.6.0woody1_ia64.deb
stable/main/binary-ia64/atftp_0.6.0woody1_ia64.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-hppa/atftpd_0.6.0woody1_hppa.deb
stable/main/binary-hppa/atftp_0.6.0woody1_hppa.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-arm/atftpd_0.6.0woody1_arm.deb
stable/main/binary-arm/atftp_0.6.0woody1_arm.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-alpha/atftpd_0.6.0woody1_alpha.deb
stable/main/binary-alpha/atftp_0.6.0woody1_alpha.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-i386/atftp_0.6.0woody1_i386.deb
stable/main/source/atftp_0.6.0woody1.dsc
stable/main/source/atftp_0.6.0woody1.tar.gz
stable/main/binary-i386/atftpd_0.6.0woody1_i386.deb
atftp (0.6.0woody1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix buffer overflow in tftpd_send_file [tftpd_file.c]


stable/main/binary-s390/apcupsd_3.8.5-1.1.1_s390.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-powerpc/apcupsd_3.8.5-1.1.1_powerpc.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-mipsel/apcupsd_3.8.5-1.1.1_mipsel.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-mips/apcupsd_3.8.5-1.1.1_mips.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-m68k/apcupsd_3.8.5-1.1.1_m68k.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-ia64/apcupsd_3.8.5-1.1.1_ia64.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-i386/apcupsd_3.8.5-1.1.1_i386.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-hppa/apcupsd_3.8.5-1.1.1_hppa.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-arm/apcupsd_3.8.5-1.1.1_arm.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-alpha/apcupsd_3.8.5-1.1.1_alpha.deb
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/source/apcupsd_3.8.5-1.1.1.diff.gz
stable/main/binary-sparc/apcupsd_3.8.5-1.1.1_sparc.deb
stable/main/source/apcupsd_3.8.5-1.1.1.dsc
apcupsd (3.8.5-1.1.1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Fixed root exploit of slave machines by upstream patch


stable/main/binary-sparc/acm_5.0-3.woody.1_sparc.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/binary-s390/acm_5.0-3.woody.1_s390.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/binary-powerpc/acm_5.0-3.woody.1_powerpc.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/binary-mipsel/acm_5.0-3.woody.1_mipsel.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/binary-mips/acm_5.0-3.woody.1_mips.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/binary-m68k/acm_5.0-3.woody.1_m68k.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/binary-ia64/acm_5.0-3.woody.1_ia64.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/binary-hppa/acm_5.0-3.woody.1_hppa.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/binary-arm/acm_5.0-3.woody.1_arm.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/binary-alpha/acm_5.0-3.woody.1_alpha.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


stable/main/source/acm_5.0-3.woody.1.diff.gz
stable/main/source/acm_5.0-3.woody.1.dsc
stable/main/binary-i386/acm_5.0-3.woody.1_i386.deb
acm (5.0-3.woody.1) stable-security; urgency=medium
  * Applied SunRPC XDR fix from glibc to identical code here
    (CVE-2002-0391)
  * Added missing dependency on NAS (won't build sound otherwise).


=========================================
Mon,  16 Dec 2002 - Debian 3.0r1a released
=========================================

No changes other than regenerated Packages files to include Task:
fields that were dropped in 3.0r1 due to a config SNAFU. :-(
	
=========================================
Sun,  15 Dec 2002 - Debian 3.0r1 released
=========================================

Removed the following packages from stable:

 cdrdao    | 1:1.1.5-3.1 | source, alpha, arm, i386, m68k, mips, mipsel, powerpc, sparc, s390
 gcdmaster | 1:1.1.5-3.1 | alpha, arm, i386, m68k, mips, mipsel, powerpc, sparc, s390
 (Reason: requested by Stable Release Manager)
   "Upstream reported: Due to license issues with the libedc_ecc
    library that is used by and distributed with cdrdao I have to
    temporarily freeze this project. All releases have been removed.

    See http://sourceforge.net/forum/forum.php?forum_id=213313
    See http://bugs.debian.org/162788"

 kernel-doc-2.2.20             |   2.2.20-5 | all
 kernel-headers-2.2.20	       |   2.2.20-4 | alpha
 kernel-image-2.2.20-alpha     |   2.2.20-4 | source
 kernel-image-2.2.20-generic   |   2.2.20-4 | alpha
 kernel-image-2.2.20-jensen    |   2.2.20-4 | alpha
 kernel-image-2.2.20-nautilus  |   2.2.20-4 | alpha
 kernel-image-2.2.20-smp       |   2.2.20-4 | alpha
 kernel-source-2.2.20	       |   2.2.20-5 | source, all
 pcmcia-modules-2.2.20	       | 3.1.33-6k5 | i386
 pcmcia-modules-2.2.20-compact | 3.1.33-6k5 | i386
 pcmcia-modules-2.2.20-idepci  | 3.1.33-6k5 | i386
 (Reason: requested by Stable Release Manager)
   "Superseded by 2.2.22."
	
----
	
stable/main/binary-sparc/yaclc_1.3.6.1_sparc.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-s390/yaclc_1.3.6.1_s390.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-powerpc/yaclc_1.3.6.1_powerpc.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-mipsel/yaclc_1.3.6.1_mipsel.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-mips/yaclc_1.3.6.1_mips.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-m68k/yaclc_1.3.6.1_m68k.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-ia64/yaclc_1.3.6.1_ia64.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-i386/yaclc_1.3.6.1_i386.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-hppa/yaclc_1.3.6.1_hppa.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-arm/yaclc_1.3.6.1_arm.deb
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/source/yaclc_1.3.6.1.dsc
stable/main/binary-alpha/yaclc_1.3.6.1_alpha.deb
stable/main/source/yaclc_1.3.6.1.tar.gz
yaclc (1.3.6.1) stable; urgency=high
  * Fixed a regular expression to parse the current BTS.  Please consider for
    stable: old version does not work anymore, and this is a one-character
    change.


stable/main/binary-s390/xinetd_2.3.4-1.2_s390.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-powerpc/xinetd_2.3.4-1.2_powerpc.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-mipsel/xinetd_2.3.4-1.2_mipsel.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-mips/xinetd_2.3.4-1.2_mips.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-m68k/xinetd_2.3.4-1.2_m68k.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-ia64/xinetd_2.3.4-1.2_ia64.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-i386/xinetd_2.3.4-1.2_i386.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-hppa/xinetd_2.3.4-1.2_hppa.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-arm/xinetd_2.3.4-1.2_arm.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-alpha/xinetd_2.3.4-1.2_alpha.deb
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-sparc/xinetd_2.3.4-1.2_sparc.deb
stable/main/source/xinetd_2.3.4-1.2.dsc
stable/main/source/xinetd_2.3.4-1.2.diff.gz
xinetd (1:2.3.4-1.2) stable-security; urgency=high
  * Non-maintainer upload by Security Team
  * Applied a patch from SolarDesigner to keep xinetd from leaking the
    recently introduced signal pipe into services started from xinetd.


stable/main/binary-s390/wwwoffle_2.7a-1.2_s390.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-powerpc/wwwoffle_2.7a-1.2_powerpc.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-mipsel/wwwoffle_2.7a-1.2_mipsel.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-mips/wwwoffle_2.7a-1.2_mips.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-m68k/wwwoffle_2.7a-1.2_m68k.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-ia64/wwwoffle_2.7a-1.2_ia64.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-i386/wwwoffle_2.7a-1.2_i386.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-hppa/wwwoffle_2.7a-1.2_hppa.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-arm/wwwoffle_2.7a-1.2_arm.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-alpha/wwwoffle_2.7a-1.2_alpha.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/source/wwwoffle_2.7a-1.2.dsc
stable/main/source/wwwoffle_2.7a-1.2.diff.gz
stable/main/binary-sparc/wwwoffle_2.7a-1.2_sparc.deb
wwwoffle (2.7a-1.2) stable-security; urgency=medium
  * Non-maintainer, security upload
  * Corrected the reaction to a user request with negative Content-Length
    (see Bug#152756)
  * Fixed handling of empty password settings
  * Replaced CanonicaliseHost() with the latest from 2.7d, offered by
    upstream.  This stops bad IPv6 format IP addresses in URLs from
    causing problems (memory overwriting, potential exploits).


stable/main/binary-sparc/weex_2.6.1-4woody1_sparc.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-s390/weex_2.6.1-4woody1_s390.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-powerpc/weex_2.6.1-4woody1_powerpc.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-mipsel/weex_2.6.1-4woody1_mipsel.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-mips/weex_2.6.1-4woody1_mips.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-m68k/weex_2.6.1-4woody1_m68k.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-ia64/weex_2.6.1-4woody1_ia64.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-hppa/weex_2.6.1-4woody1_hppa.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-arm/weex_2.6.1-4woody1_arm.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-alpha/weex_2.6.1-4woody1_alpha.deb
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/source/weex_2.6.1-4woody1.dsc
stable/main/binary-i386/weex_2.6.1-4woody1_i386.deb
stable/main/source/weex_2.6.1-4woody1.diff.gz
weex (2.6.1-4woody1) stable; urgency=medium
  * Repackaged weex 2.6.1-5 for inclusion in Woody to fix the core dump bug.
    Closes: Bug#150185


stable/main/binary-sparc/uptimed_0.1.7-2woody0_sparc.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/binary-s390/uptimed_0.1.7-2woody0_s390.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/binary-powerpc/uptimed_0.1.7-2woody0_powerpc.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/binary-mipsel/uptimed_0.1.7-2woody0_mipsel.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/binary-mips/uptimed_0.1.7-2woody0_mips.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/binary-m68k/uptimed_0.1.7-2woody0_m68k.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/binary-ia64/uptimed_0.1.7-2woody0_ia64.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/binary-hppa/uptimed_0.1.7-2woody0_hppa.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/binary-arm/uptimed_0.1.7-2woody0_arm.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/binary-alpha/uptimed_0.1.7-2woody0_alpha.deb
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/main/source/uptimed_0.1.7-2woody0.dsc
stable/main/binary-i386/uptimed_0.1.7-2woody0_i386.deb
stable/main/binary-all/uprecords-cgi_0.1.7-2woody0_all.deb
stable/main/source/uptimed_0.1.7-2woody0.diff.gz
uptimed (1:0.1.7-2woody0) stable; urgency=low
  * Fixed upgrade path from potato (Closes: #157918)


stable/contrib/binary-all/libtomcat4-java_4.0.3-3woody1_all.deb
stable/contrib/source/tomcat4_4.0.3-3woody1.dsc
stable/contrib/source/tomcat4_4.0.3-3woody1.diff.gz
stable/contrib/binary-all/tomcat4_4.0.3-3woody1_all.deb
stable/contrib/binary-all/tomcat4-webapps_4.0.3-3woody1_all.deb
tomcat4 (4.0.3-3woody1) stable-security; urgency=high
  * Include security patch from Tomcat 4.0.5 which fixes a JSP source
    disclosure vulnerability


stable/main/binary-s390/tkmail_4.0beta9-8.1_s390.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-powerpc/tkmail_4.0beta9-8.1_powerpc.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-mipsel/tkmail_4.0beta9-8.1_mipsel.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-mips/tkmail_4.0beta9-8.1_mips.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-m68k/tkmail_4.0beta9-8.1_m68k.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-ia64/tkmail_4.0beta9-8.1_ia64.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-i386/tkmail_4.0beta9-8.1_i386.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-hppa/tkmail_4.0beta9-8.1_hppa.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-arm/tkmail_4.0beta9-8.1_arm.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-alpha/tkmail_4.0beta9-8.1_alpha.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/source/tkmail_4.0beta9-8.1.dsc
stable/main/source/tkmail_4.0beta9-8.1.diff.gz
stable/main/binary-sparc/tkmail_4.0beta9-8.1_sparc.deb
tkmail (4.0beta9-8.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Create temporary files with O_EXCL and 0600 permissions.
  * Thanks to Matej Vela <vela@debian.org>


stable/main/binary-s390/tinyproxy_1.4.3-2woody2_s390.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-powerpc/tinyproxy_1.4.3-2woody2_powerpc.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-mipsel/tinyproxy_1.4.3-2woody2_mipsel.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-mips/tinyproxy_1.4.3-2woody2_mips.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-m68k/tinyproxy_1.4.3-2woody2_m68k.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-ia64/tinyproxy_1.4.3-2woody2_ia64.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-i386/tinyproxy_1.4.3-2woody2_i386.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-hppa/tinyproxy_1.4.3-2woody2_hppa.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-arm/tinyproxy_1.4.3-2woody2_arm.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-alpha/tinyproxy_1.4.3-2woody2_alpha.deb
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/source/tinyproxy_1.4.3-2woody2.diff.gz
stable/main/binary-sparc/tinyproxy_1.4.3-2woody2_sparc.deb
stable/main/source/tinyproxy_1.4.3-2woody2.dsc
tinyproxy (1.4.3-2woody2) stable-security; urgency=high
  * Non-maintainer release by the security team
  * Incorporating parts from 1.4.3-2, 1.4.3-3 and two different
    incarnations of 1.4.3-2woody1, all by the maintainer, apparently.
  * The package had to be rebuilt anyway becaus of the two different
    versions with the same version number and a broken distribution line.
    . Only remove /etc/tinyproxy on purge
    . Recreate that directory if it was removed accidently
    . Store tinyproxy.conf in /usr/share so the postinst script is able to
      copy it back
    . SECURITY: Fixed double-free errors in consultation with upstream
      authors. This fix affects woody. (Bug#147240)
    . SecurityFocus has info on this bug at:
      http://online.securityfocus.com/bid/4731/info/


stable/main/binary-sparc/libkpathsea3_1.0.7+20011202-7.1_sparc.deb
stable/main/binary-sparc/libkpathsea-dev_1.0.7+20011202-7.1_sparc.deb
stable/main/binary-sparc/tetex-bin_1.0.7+20011202-7.1_sparc.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/binary-s390/libkpathsea3_1.0.7+20011202-7.1_s390.deb
stable/main/binary-s390/libkpathsea-dev_1.0.7+20011202-7.1_s390.deb
stable/main/binary-s390/tetex-bin_1.0.7+20011202-7.1_s390.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/binary-powerpc/libkpathsea3_1.0.7+20011202-7.1_powerpc.deb
stable/main/binary-powerpc/libkpathsea-dev_1.0.7+20011202-7.1_powerpc.deb
stable/main/binary-powerpc/tetex-bin_1.0.7+20011202-7.1_powerpc.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/binary-mips/libkpathsea3_1.0.7+20011202-7.1_mips.deb
stable/main/binary-mips/libkpathsea-dev_1.0.7+20011202-7.1_mips.deb
stable/main/binary-mips/tetex-bin_1.0.7+20011202-7.1_mips.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/binary-m68k/libkpathsea-dev_1.0.7+20011202-7.1_m68k.deb
stable/main/binary-m68k/libkpathsea3_1.0.7+20011202-7.1_m68k.deb
stable/main/binary-m68k/tetex-bin_1.0.7+20011202-7.1_m68k.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/binary-ia64/libkpathsea-dev_1.0.7+20011202-7.1_ia64.deb
stable/main/binary-ia64/libkpathsea3_1.0.7+20011202-7.1_ia64.deb
stable/main/binary-ia64/tetex-bin_1.0.7+20011202-7.1_ia64.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/binary-i386/tetex-bin_1.0.7+20011202-7.1_i386.deb
stable/main/binary-i386/libkpathsea-dev_1.0.7+20011202-7.1_i386.deb
stable/main/binary-i386/libkpathsea3_1.0.7+20011202-7.1_i386.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/binary-hppa/tetex-bin_1.0.7+20011202-7.1_hppa.deb
stable/main/binary-hppa/libkpathsea-dev_1.0.7+20011202-7.1_hppa.deb
stable/main/binary-hppa/libkpathsea3_1.0.7+20011202-7.1_hppa.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/binary-arm/tetex-bin_1.0.7+20011202-7.1_arm.deb
stable/main/binary-arm/libkpathsea-dev_1.0.7+20011202-7.1_arm.deb
stable/main/binary-arm/libkpathsea3_1.0.7+20011202-7.1_arm.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/binary-alpha/libkpathsea3_1.0.7+20011202-7.1_alpha.deb
stable/main/binary-alpha/libkpathsea-dev_1.0.7+20011202-7.1_alpha.deb
stable/main/binary-alpha/tetex-bin_1.0.7+20011202-7.1_alpha.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/source/tetex-bin_1.0.7+20011202-7.1.dsc
stable/main/source/tetex-bin_1.0.7+20011202-7.1.tar.gz
stable/main/binary-mipsel/libkpathsea3_1.0.7+20011202-7.1_mipsel.deb
stable/main/binary-mipsel/tetex-bin_1.0.7+20011202-7.1_mipsel.deb
stable/main/binary-mipsel/libkpathsea-dev_1.0.7+20011202-7.1_mipsel.deb
tetex-bin (1.0.7+20011202-7.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed a command execution vulnerability in dvips and xdvi (Thanks Olaf Kirch)
  * Add special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.  Added to {config,texk}/config.guess.


stable/main/source/tendra_4.1.2-9.woody1.diff.gz
stable/main/binary-i386/tendra_4.1.2-9.woody1_i386.deb
stable/main/source/tendra_4.1.2-9.woody1.dsc
tendra (4.1.2-9.woody1) stable; urgency=low
  * Don't copy runtime files.


stable/main/binary-sparc/tcpdump_3.6.2-2.2_sparc.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-s390/tcpdump_3.6.2-2.2_s390.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-powerpc/tcpdump_3.6.2-2.2_powerpc.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-mipsel/tcpdump_3.6.2-2.2_mipsel.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-mips/tcpdump_3.6.2-2.2_mips.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-m68k/tcpdump_3.6.2-2.2_m68k.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-ia64/tcpdump_3.6.2-2.2_ia64.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-hppa/tcpdump_3.6.2-2.2_hppa.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-arm/tcpdump_3.6.2-2.2_arm.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-alpha/tcpdump_3.6.2-2.2_alpha.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/source/tcpdump_3.6.2-2.2.dsc
stable/main/source/tcpdump_3.6.2-2.2.diff.gz
stable/main/binary-i386/tcpdump_3.6.2-2.2_i386.deb
tcpdump (3.6.2-2.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Merge BGP decoding patch from SCO advisory CSSA-2002-050.0


stable/main/binary-sparc/sympa_3.3.3-3_sparc.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-s390/sympa_3.3.3-3_s390.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-powerpc/sympa_3.3.3-3_powerpc.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-mipsel/sympa_3.3.3-3_mipsel.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-mips/sympa_3.3.3-3_mips.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-m68k/sympa_3.3.3-3_m68k.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-ia64/sympa_3.3.3-3_ia64.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-hppa/sympa_3.3.3-3_hppa.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-arm/sympa_3.3.3-3_arm.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-alpha/sympa_3.3.3-3_alpha.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/source/sympa_3.3.3-3.diff.gz
stable/main/source/sympa_3.3.3-3.dsc
stable/main/binary-i386/sympa_3.3.3-3_i386.deb
stable/main/binary-all/wwsympa_3.3.3-3_all.deb
sympa (3.3.3-3) stable; urgency=high
  * debian/control: moved libnet-ldap-perl dependency from Suggests
    to Depends. Closes: Bug#167924.


stable/main/binary-sparc/super_3.16.1-1.1_sparc.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/binary-s390/super_3.16.1-1.1_s390.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/binary-powerpc/super_3.16.1-1.1_powerpc.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/binary-mipsel/super_3.16.1-1.1_mipsel.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/binary-mips/super_3.16.1-1.1_mips.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/binary-ia64/super_3.16.1-1.1_ia64.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/binary-i386/super_3.16.1-1.1_i386.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/binary-hppa/super_3.16.1-1.1_hppa.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/binary-arm/super_3.16.1-1.1_arm.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/binary-alpha/super_3.16.1-1.1_alpha.deb
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/source/super_3.16.1-1.1.diff.gz
stable/main/binary-m68k/super_3.16.1-1.1_m68k.deb
stable/main/source/super_3.16.1-1.1.dsc
super (3.16.1-1.1) stable-security; urgency=high
  * Applied patch from the current Debian maintainer Robert Luberda that
    fixes a format string vulnerability, which was discovered by GOBBLES


stable/main/source/squirrelmail_1.2.6-1.2.diff.gz
stable/main/binary-all/squirrelmail_1.2.6-1.2_all.deb
stable/main/source/squirrelmail_1.2.6-1.2.dsc
squirrelmail (1:1.2.6-1.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Fixed the options page, whoops


stable/main/binary-sparc/snort-mysql_1.8.4beta1-3_sparc.deb
stable/main/binary-sparc/snort-common_1.8.4beta1-3_sparc.deb
stable/main/binary-sparc/snort_1.8.4beta1-3_sparc.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-s390/snort_1.8.4beta1-3_s390.deb
stable/main/binary-s390/snort-mysql_1.8.4beta1-3_s390.deb
stable/main/binary-s390/snort-common_1.8.4beta1-3_s390.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-powerpc/snort-common_1.8.4beta1-3_powerpc.deb
stable/main/binary-powerpc/snort_1.8.4beta1-3_powerpc.deb
stable/main/binary-powerpc/snort-mysql_1.8.4beta1-3_powerpc.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-mipsel/snort-mysql_1.8.4beta1-3_mipsel.deb
stable/main/binary-mipsel/snort_1.8.4beta1-3_mipsel.deb
stable/main/binary-mipsel/snort-common_1.8.4beta1-3_mipsel.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-mips/snort-common_1.8.4beta1-3_mips.deb
stable/main/binary-mips/snort_1.8.4beta1-3_mips.deb
stable/main/binary-mips/snort-mysql_1.8.4beta1-3_mips.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-m68k/snort-common_1.8.4beta1-3_m68k.deb
stable/main/binary-m68k/snort-mysql_1.8.4beta1-3_m68k.deb
stable/main/binary-m68k/snort_1.8.4beta1-3_m68k.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-ia64/snort-mysql_1.8.4beta1-3_ia64.deb
stable/main/binary-ia64/snort-common_1.8.4beta1-3_ia64.deb
stable/main/binary-ia64/snort_1.8.4beta1-3_ia64.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-hppa/snort-mysql_1.8.4beta1-3_hppa.deb
stable/main/binary-hppa/snort_1.8.4beta1-3_hppa.deb
stable/main/binary-hppa/snort-common_1.8.4beta1-3_hppa.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-arm/snort_1.8.4beta1-3_arm.deb
stable/main/binary-arm/snort-mysql_1.8.4beta1-3_arm.deb
stable/main/binary-arm/snort-common_1.8.4beta1-3_arm.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-alpha/snort_1.8.4beta1-3_alpha.deb
stable/main/binary-alpha/snort-common_1.8.4beta1-3_alpha.deb
stable/main/binary-alpha/snort-mysql_1.8.4beta1-3_alpha.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-all/snort-rules-default_1.8.4beta1-3_all.deb
stable/main/source/snort_1.8.4beta1-3.diff.gz
stable/main/binary-i386/snort-common_1.8.4beta1-3_i386.deb
stable/main/source/snort_1.8.4beta1-3.dsc
stable/main/binary-i386/snort-mysql_1.8.4beta1-3_i386.deb
stable/main/binary-i386/snort_1.8.4beta1-3_i386.deb
stable/main/binary-all/snort-doc_1.8.4beta1-3_all.deb
snort (1.8.4beta1-3) stable; urgency=low
  + Mandatory upload to stable because the previous package
    had serious problems that were fixed only one package release
    later that JUST didn't get into woody.
  ! Fixed 'snort.debian.conf is empty at fresh install'
  + New 'snort-stat' included, fixes 'Empty subject' bugs
  + Fixes to daily cronjob's email thingy.
    Now honours DEBIAN_SNORT_STAT_TRESHOLD


stable/main/binary-sparc/silo_1.2.5-2_sparc.deb
stable/main/source/silo_1.2.5-2.diff.gz
stable/main/source/silo_1.2.5-2.dsc
silo (1.2.5-2) stable; urgency=low
  * Add patch for UltraSPARC III+ (Cheetah+) support from DaveM.


stable/main/binary-s390/libscrollkeeper0_0.3.6-3.1_s390.deb
stable/main/binary-s390/libscrollkeeper-dev_0.3.6-3.1_s390.deb
stable/main/binary-s390/scrollkeeper_0.3.6-3.1_s390.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-powerpc/libscrollkeeper0_0.3.6-3.1_powerpc.deb
stable/main/binary-powerpc/scrollkeeper_0.3.6-3.1_powerpc.deb
stable/main/binary-powerpc/libscrollkeeper-dev_0.3.6-3.1_powerpc.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-mipsel/libscrollkeeper0_0.3.6-3.1_mipsel.deb
stable/main/binary-mipsel/libscrollkeeper-dev_0.3.6-3.1_mipsel.deb
stable/main/binary-mipsel/scrollkeeper_0.3.6-3.1_mipsel.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-mips/libscrollkeeper0_0.3.6-3.1_mips.deb
stable/main/binary-mips/libscrollkeeper-dev_0.3.6-3.1_mips.deb
stable/main/binary-mips/scrollkeeper_0.3.6-3.1_mips.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-m68k/libscrollkeeper0_0.3.6-3.1_m68k.deb
stable/main/binary-m68k/libscrollkeeper-dev_0.3.6-3.1_m68k.deb
stable/main/binary-m68k/scrollkeeper_0.3.6-3.1_m68k.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-ia64/libscrollkeeper0_0.3.6-3.1_ia64.deb
stable/main/binary-ia64/scrollkeeper_0.3.6-3.1_ia64.deb
stable/main/binary-ia64/libscrollkeeper-dev_0.3.6-3.1_ia64.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-i386/libscrollkeeper-dev_0.3.6-3.1_i386.deb
stable/main/binary-i386/scrollkeeper_0.3.6-3.1_i386.deb
stable/main/binary-i386/libscrollkeeper0_0.3.6-3.1_i386.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-hppa/libscrollkeeper0_0.3.6-3.1_hppa.deb
stable/main/binary-hppa/libscrollkeeper-dev_0.3.6-3.1_hppa.deb
stable/main/binary-hppa/scrollkeeper_0.3.6-3.1_hppa.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-arm/libscrollkeeper-dev_0.3.6-3.1_arm.deb
stable/main/binary-arm/libscrollkeeper0_0.3.6-3.1_arm.deb
stable/main/binary-arm/scrollkeeper_0.3.6-3.1_arm.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-alpha/scrollkeeper_0.3.6-3.1_alpha.deb
stable/main/binary-alpha/libscrollkeeper0_0.3.6-3.1_alpha.deb
stable/main/binary-alpha/libscrollkeeper-dev_0.3.6-3.1_alpha.deb
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-sparc/libscrollkeeper-dev_0.3.6-3.1_sparc.deb
stable/main/binary-sparc/libscrollkeeper0_0.3.6-3.1_sparc.deb
stable/main/source/scrollkeeper_0.3.6-3.1.dsc
stable/main/binary-sparc/scrollkeeper_0.3.6-3.1_sparc.deb
stable/main/source/scrollkeeper_0.3.6-3.1.diff.gz
scrollkeeper (0.3.6-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied patch by Alexander Larsson to fix temporary file vulnerability
    (CAN-2002-0662)


stable/main/binary-sparc/samba_2.2.3a-12_sparc.deb
stable/main/binary-sparc/libpam-smbpass_2.2.3a-12_sparc.deb
stable/main/binary-sparc/libsmbclient-dev_2.2.3a-12_sparc.deb
stable/main/binary-sparc/smbclient_2.2.3a-12_sparc.deb
stable/main/binary-sparc/winbind_2.2.3a-12_sparc.deb
stable/main/binary-sparc/samba-common_2.2.3a-12_sparc.deb
stable/main/binary-sparc/libsmbclient_2.2.3a-12_sparc.deb
stable/main/binary-sparc/smbfs_2.2.3a-12_sparc.deb
stable/main/binary-sparc/swat_2.2.3a-12_sparc.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-s390/libsmbclient-dev_2.2.3a-12_s390.deb
stable/main/binary-s390/libpam-smbpass_2.2.3a-12_s390.deb
stable/main/binary-s390/smbclient_2.2.3a-12_s390.deb
stable/main/binary-s390/libsmbclient_2.2.3a-12_s390.deb
stable/main/binary-s390/samba-common_2.2.3a-12_s390.deb
stable/main/binary-s390/smbfs_2.2.3a-12_s390.deb
stable/main/binary-s390/samba_2.2.3a-12_s390.deb
stable/main/binary-s390/swat_2.2.3a-12_s390.deb
stable/main/binary-s390/winbind_2.2.3a-12_s390.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-powerpc/winbind_2.2.3a-12_powerpc.deb
stable/main/binary-powerpc/swat_2.2.3a-12_powerpc.deb
stable/main/binary-powerpc/libsmbclient-dev_2.2.3a-12_powerpc.deb
stable/main/binary-powerpc/samba-common_2.2.3a-12_powerpc.deb
stable/main/binary-powerpc/smbfs_2.2.3a-12_powerpc.deb
stable/main/binary-powerpc/samba_2.2.3a-12_powerpc.deb
stable/main/binary-powerpc/smbclient_2.2.3a-12_powerpc.deb
stable/main/binary-powerpc/libsmbclient_2.2.3a-12_powerpc.deb
stable/main/binary-powerpc/libpam-smbpass_2.2.3a-12_powerpc.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-mipsel/smbclient_2.2.3a-12_mipsel.deb
stable/main/binary-mipsel/libsmbclient_2.2.3a-12_mipsel.deb
stable/main/binary-mipsel/libpam-smbpass_2.2.3a-12_mipsel.deb
stable/main/binary-mipsel/libsmbclient-dev_2.2.3a-12_mipsel.deb
stable/main/binary-mipsel/smbfs_2.2.3a-12_mipsel.deb
stable/main/binary-mipsel/samba_2.2.3a-12_mipsel.deb
stable/main/binary-mipsel/samba-common_2.2.3a-12_mipsel.deb
stable/main/binary-mipsel/swat_2.2.3a-12_mipsel.deb
stable/main/binary-mipsel/winbind_2.2.3a-12_mipsel.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-mips/swat_2.2.3a-12_mips.deb
stable/main/binary-mips/libsmbclient-dev_2.2.3a-12_mips.deb
stable/main/binary-mips/libsmbclient_2.2.3a-12_mips.deb
stable/main/binary-mips/smbfs_2.2.3a-12_mips.deb
stable/main/binary-mips/libpam-smbpass_2.2.3a-12_mips.deb
stable/main/binary-mips/samba-common_2.2.3a-12_mips.deb
stable/main/binary-mips/smbclient_2.2.3a-12_mips.deb
stable/main/binary-mips/winbind_2.2.3a-12_mips.deb
stable/main/binary-mips/samba_2.2.3a-12_mips.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-m68k/swat_2.2.3a-12_m68k.deb
stable/main/binary-m68k/samba_2.2.3a-12_m68k.deb
stable/main/binary-m68k/winbind_2.2.3a-12_m68k.deb
stable/main/binary-m68k/libsmbclient_2.2.3a-12_m68k.deb
stable/main/binary-m68k/libpam-smbpass_2.2.3a-12_m68k.deb
stable/main/binary-m68k/libsmbclient-dev_2.2.3a-12_m68k.deb
stable/main/binary-m68k/samba-common_2.2.3a-12_m68k.deb
stable/main/binary-m68k/smbclient_2.2.3a-12_m68k.deb
stable/main/binary-m68k/smbfs_2.2.3a-12_m68k.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-ia64/libsmbclient_2.2.3a-12_ia64.deb
stable/main/binary-ia64/smbfs_2.2.3a-12_ia64.deb
stable/main/binary-ia64/swat_2.2.3a-12_ia64.deb
stable/main/binary-ia64/samba_2.2.3a-12_ia64.deb
stable/main/binary-ia64/samba-common_2.2.3a-12_ia64.deb
stable/main/binary-ia64/smbclient_2.2.3a-12_ia64.deb
stable/main/binary-ia64/winbind_2.2.3a-12_ia64.deb
stable/main/binary-ia64/libpam-smbpass_2.2.3a-12_ia64.deb
stable/main/binary-ia64/libsmbclient-dev_2.2.3a-12_ia64.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-hppa/libsmbclient_2.2.3a-12_hppa.deb
stable/main/binary-hppa/libsmbclient-dev_2.2.3a-12_hppa.deb
stable/main/binary-hppa/winbind_2.2.3a-12_hppa.deb
stable/main/binary-hppa/libpam-smbpass_2.2.3a-12_hppa.deb
stable/main/binary-hppa/samba-common_2.2.3a-12_hppa.deb
stable/main/binary-hppa/smbfs_2.2.3a-12_hppa.deb
stable/main/binary-hppa/swat_2.2.3a-12_hppa.deb
stable/main/binary-hppa/smbclient_2.2.3a-12_hppa.deb
stable/main/binary-hppa/samba_2.2.3a-12_hppa.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-arm/samba-common_2.2.3a-12_arm.deb
stable/main/binary-arm/smbfs_2.2.3a-12_arm.deb
stable/main/binary-arm/winbind_2.2.3a-12_arm.deb
stable/main/binary-arm/swat_2.2.3a-12_arm.deb
stable/main/binary-arm/libsmbclient_2.2.3a-12_arm.deb
stable/main/binary-arm/libpam-smbpass_2.2.3a-12_arm.deb
stable/main/binary-arm/libsmbclient-dev_2.2.3a-12_arm.deb
stable/main/binary-arm/smbclient_2.2.3a-12_arm.deb
stable/main/binary-arm/samba_2.2.3a-12_arm.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-alpha/libpam-smbpass_2.2.3a-12_alpha.deb
stable/main/binary-alpha/libsmbclient-dev_2.2.3a-12_alpha.deb
stable/main/binary-alpha/smbfs_2.2.3a-12_alpha.deb
stable/main/binary-alpha/samba-common_2.2.3a-12_alpha.deb
stable/main/binary-alpha/swat_2.2.3a-12_alpha.deb
stable/main/binary-alpha/libsmbclient_2.2.3a-12_alpha.deb
stable/main/binary-alpha/winbind_2.2.3a-12_alpha.deb
stable/main/binary-alpha/smbclient_2.2.3a-12_alpha.deb
stable/main/binary-alpha/samba_2.2.3a-12_alpha.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-all/samba-doc_2.2.3a-12_all.deb
stable/main/binary-i386/libpam-smbpass_2.2.3a-12_i386.deb
stable/main/binary-i386/samba_2.2.3a-12_i386.deb
stable/main/binary-i386/samba-common_2.2.3a-12_i386.deb
stable/main/source/samba_2.2.3a-12.diff.gz
stable/main/source/samba_2.2.3a-12.dsc
stable/main/binary-i386/winbind_2.2.3a-12_i386.deb
stable/main/binary-i386/smbfs_2.2.3a-12_i386.deb
stable/main/binary-i386/smbclient_2.2.3a-12_i386.deb
stable/main/binary-i386/libsmbclient-dev_2.2.3a-12_i386.deb
stable/main/binary-i386/libsmbclient_2.2.3a-12_i386.deb
stable/main/binary-i386/swat_2.2.3a-12_i386.deb
samba (2.2.3a-12) stable-security; urgency=high
  * rebuild and reupload, since someone thought the last build was bad
    enough to set satie on fire.


stable/main/binary-sparc/librio500-dev_0.7-7woody2_sparc.deb
stable/main/binary-sparc/rio500_0.7-7woody2_sparc.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-s390/librio500-dev_0.7-7woody2_s390.deb
stable/main/binary-s390/rio500_0.7-7woody2_s390.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-powerpc/librio500-dev_0.7-7woody2_powerpc.deb
stable/main/binary-powerpc/rio500_0.7-7woody2_powerpc.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-mipsel/librio500-dev_0.7-7woody2_mipsel.deb
stable/main/binary-mipsel/rio500_0.7-7woody2_mipsel.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-mips/librio500-dev_0.7-7woody2_mips.deb
stable/main/binary-mips/rio500_0.7-7woody2_mips.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-m68k/librio500-dev_0.7-7woody2_m68k.deb
stable/main/binary-m68k/rio500_0.7-7woody2_m68k.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-ia64/librio500-dev_0.7-7woody2_ia64.deb
stable/main/binary-ia64/rio500_0.7-7woody2_ia64.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-hppa/librio500-dev_0.7-7woody2_hppa.deb
stable/main/binary-hppa/rio500_0.7-7woody2_hppa.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-arm/rio500_0.7-7woody2_arm.deb
stable/main/binary-arm/librio500-dev_0.7-7woody2_arm.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-alpha/rio500_0.7-7woody2_alpha.deb
stable/main/binary-alpha/librio500-dev_0.7-7woody2_alpha.deb
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-i386/librio500-dev_0.7-7woody2_i386.deb
stable/main/source/rio500_0.7-7woody2.diff.gz
stable/main/binary-i386/rio500_0.7-7woody2_i386.deb
stable/main/source/rio500_0.7-7woody2.dsc
rio500 (0.7-7woody2) stable; urgency=low
  * Re-upload using the correct email address in the changelog, so this
    won't be processed as a NMU.


stable/main/binary-sparc/qpopper_4.0.4-2.woody.1_sparc.deb
stable/main/binary-sparc/qpopper-drac_4.0.4-2.woody.1_sparc.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-s390/qpopper_4.0.4-2.woody.1_s390.deb
stable/main/binary-s390/qpopper-drac_4.0.4-2.woody.1_s390.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-powerpc/qpopper_4.0.4-2.woody.1_powerpc.deb
stable/main/binary-powerpc/qpopper-drac_4.0.4-2.woody.1_powerpc.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-mipsel/qpopper_4.0.4-2.woody.1_mipsel.deb
stable/main/binary-mipsel/qpopper-drac_4.0.4-2.woody.1_mipsel.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-mips/qpopper_4.0.4-2.woody.1_mips.deb
stable/main/binary-mips/qpopper-drac_4.0.4-2.woody.1_mips.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-m68k/qpopper-drac_4.0.4-2.woody.1_m68k.deb
stable/main/binary-m68k/qpopper_4.0.4-2.woody.1_m68k.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-ia64/qpopper_4.0.4-2.woody.1_ia64.deb
stable/main/binary-ia64/qpopper-drac_4.0.4-2.woody.1_ia64.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-hppa/qpopper_4.0.4-2.woody.1_hppa.deb
stable/main/binary-hppa/qpopper-drac_4.0.4-2.woody.1_hppa.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-arm/qpopper-drac_4.0.4-2.woody.1_arm.deb
stable/main/binary-arm/qpopper_4.0.4-2.woody.1_arm.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-alpha/qpopper-drac_4.0.4-2.woody.1_alpha.deb
stable/main/binary-alpha/qpopper_4.0.4-2.woody.1_alpha.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-i386/qpopper-drac_4.0.4-2.woody.1_i386.deb
stable/main/source/qpopper_4.0.4-2.woody.1.dsc
stable/main/source/qpopper_4.0.4-2.woody.1.diff.gz
stable/main/binary-i386/qpopper_4.0.4-2.woody.1_i386.deb
qpopper (4.0.4-2.woody.1) stable; urgency=low
  * qpopper couldn't work with Eudora clients and openssl
    0.9.6c-2.woody.1 that was provided in DSA-136.  This verison
    fixed that bug.


stable/main/binary-s390/python1.5-mpz_1.5.2-23.3_s390.deb
stable/main/binary-s390/python1.5-gdbm_1.5.2-23.3_s390.deb
stable/main/binary-s390/python1.5-tk_1.5.2-23.3_s390.deb
stable/main/binary-s390/python1.5-dev_1.5.2-23.3_s390.deb
stable/main/binary-s390/python1.5_1.5.2-23.3_s390.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-powerpc/python1.5_1.5.2-23.3_powerpc.deb
stable/main/binary-powerpc/python1.5-gdbm_1.5.2-23.3_powerpc.deb
stable/main/binary-powerpc/python1.5-tk_1.5.2-23.3_powerpc.deb
stable/main/binary-powerpc/python1.5-mpz_1.5.2-23.3_powerpc.deb
stable/main/binary-powerpc/python1.5-dev_1.5.2-23.3_powerpc.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-mipsel/python1.5-dev_1.5.2-23.3_mipsel.deb
stable/main/binary-mipsel/python1.5-tk_1.5.2-23.3_mipsel.deb
stable/main/binary-mipsel/python1.5_1.5.2-23.3_mipsel.deb
stable/main/binary-mipsel/python1.5-mpz_1.5.2-23.3_mipsel.deb
stable/main/binary-mipsel/python1.5-gdbm_1.5.2-23.3_mipsel.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-mips/python1.5-gdbm_1.5.2-23.3_mips.deb
stable/main/binary-mips/python1.5-tk_1.5.2-23.3_mips.deb
stable/main/binary-mips/python1.5-dev_1.5.2-23.3_mips.deb
stable/main/binary-mips/python1.5_1.5.2-23.3_mips.deb
stable/main/binary-mips/python1.5-mpz_1.5.2-23.3_mips.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-m68k/python1.5_1.5.2-23.3_m68k.deb
stable/main/binary-m68k/python1.5-mpz_1.5.2-23.3_m68k.deb
stable/main/binary-m68k/python1.5-gdbm_1.5.2-23.3_m68k.deb
stable/main/binary-m68k/python1.5-dev_1.5.2-23.3_m68k.deb
stable/main/binary-m68k/python1.5-tk_1.5.2-23.3_m68k.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-ia64/python1.5-dev_1.5.2-23.3_ia64.deb
stable/main/binary-ia64/python1.5-tk_1.5.2-23.3_ia64.deb
stable/main/binary-ia64/python1.5-gdbm_1.5.2-23.3_ia64.deb
stable/main/binary-ia64/python1.5_1.5.2-23.3_ia64.deb
stable/main/binary-ia64/python1.5-mpz_1.5.2-23.3_ia64.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-i386/python1.5-mpz_1.5.2-23.3_i386.deb
stable/main/binary-i386/python1.5-gdbm_1.5.2-23.3_i386.deb
stable/main/binary-i386/python1.5-dev_1.5.2-23.3_i386.deb
stable/main/binary-i386/python1.5-tk_1.5.2-23.3_i386.deb
stable/main/binary-i386/python1.5_1.5.2-23.3_i386.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-hppa/python1.5_1.5.2-23.3_hppa.deb
stable/main/binary-hppa/python1.5-mpz_1.5.2-23.3_hppa.deb
stable/main/binary-hppa/python1.5-tk_1.5.2-23.3_hppa.deb
stable/main/binary-hppa/python1.5-dev_1.5.2-23.3_hppa.deb
stable/main/binary-hppa/python1.5-gdbm_1.5.2-23.3_hppa.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-arm/python1.5_1.5.2-23.3_arm.deb
stable/main/binary-arm/python1.5-tk_1.5.2-23.3_arm.deb
stable/main/binary-arm/python1.5-mpz_1.5.2-23.3_arm.deb
stable/main/binary-arm/python1.5-dev_1.5.2-23.3_arm.deb
stable/main/binary-arm/python1.5-gdbm_1.5.2-23.3_arm.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-alpha/python1.5-gdbm_1.5.2-23.3_alpha.deb
stable/main/binary-alpha/python1.5-mpz_1.5.2-23.3_alpha.deb
stable/main/binary-alpha/python1.5-dev_1.5.2-23.3_alpha.deb
stable/main/binary-alpha/python1.5-tk_1.5.2-23.3_alpha.deb
stable/main/binary-alpha/python1.5_1.5.2-23.3_alpha.deb
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-sparc/python1.5-mpz_1.5.2-23.3_sparc.deb
stable/main/binary-sparc/python1.5-tk_1.5.2-23.3_sparc.deb
stable/main/binary-sparc/python1.5-dev_1.5.2-23.3_sparc.deb
stable/main/source/python1.5_1.5.2-23.3.dsc
stable/main/binary-all/idle-python1.5_1.5.2-23.3_all.deb
stable/main/binary-sparc/python1.5_1.5.2-23.3_sparc.deb
stable/main/binary-all/python1.5-examples_1.5.2-23.3_all.deb
stable/main/binary-sparc/python1.5-gdbm_1.5.2-23.3_sparc.deb
stable/main/source/python1.5_1.5.2-23.3.diff.gz
python1.5 (1.5.2-23.3) stable-security; urgency=high
  * Another non-maintainer upload by the security team
  * Correct os.py to be compatible with Python 1.5 where no string method
    foo.split() exists but only a module member string.split() from the
    string module which needs to be imported.


stable/main/binary-s390/purity_1-14.2_s390.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-powerpc/purity_1-14.2_powerpc.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-mipsel/purity_1-14.2_mipsel.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-mips/purity_1-14.2_mips.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-m68k/purity_1-14.2_m68k.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-ia64/purity_1-14.2_ia64.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-i386/purity_1-14.2_i386.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-hppa/purity_1-14.2_hppa.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-arm/purity_1-14.2_arm.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-alpha/purity_1-14.2_alpha.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/source/purity_1-14.2.dsc
stable/main/source/purity_1-14.2.diff.gz
stable/main/binary-sparc/purity_1-14.2_sparc.deb
purity (1-14.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed two buffer overflows
  * Removed .orig file which was left over from patching


stable/main/binary-m68k/postfix-tls_1.1.11+tls0.7.15-0.woody1_m68k.deb
postfix-tls (1.1.11+tls0.7.15-0.woody1) testing; urgency=low
  * New postfix release.


stable/main/binary-sparc/php4-mysql_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-sybase_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-odbc_4.1.2-6_sparc.deb
stable/main/binary-sparc/caudium-php4_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-recode_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-cgi_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-gd_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-imap_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-mcal_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-snmp_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-ldap_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-curl_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-xslt_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-mhash_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4-domxml_4.1.2-6_sparc.deb
stable/main/binary-sparc/php4_4.1.2-6_sparc.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-s390/php4-mhash_4.1.2-6_s390.deb
stable/main/binary-s390/caudium-php4_4.1.2-6_s390.deb
stable/main/binary-s390/php4-domxml_4.1.2-6_s390.deb
stable/main/binary-s390/php4-mcal_4.1.2-6_s390.deb
stable/main/binary-s390/php4-imap_4.1.2-6_s390.deb
stable/main/binary-s390/php4-mysql_4.1.2-6_s390.deb
stable/main/binary-s390/php4-cgi_4.1.2-6_s390.deb
stable/main/binary-s390/php4-xslt_4.1.2-6_s390.deb
stable/main/binary-s390/php4-recode_4.1.2-6_s390.deb
stable/main/binary-s390/php4_4.1.2-6_s390.deb
stable/main/binary-s390/php4-ldap_4.1.2-6_s390.deb
stable/main/binary-s390/php4-odbc_4.1.2-6_s390.deb
stable/main/binary-s390/php4-snmp_4.1.2-6_s390.deb
stable/main/binary-s390/php4-sybase_4.1.2-6_s390.deb
stable/main/binary-s390/php4-curl_4.1.2-6_s390.deb
stable/main/binary-s390/php4-gd_4.1.2-6_s390.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-mipsel/php4-recode_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-odbc_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-gd_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-mhash_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-mysql_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-imap_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-mcal_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/caudium-php4_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-cgi_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-xslt_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-domxml_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-ldap_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-sybase_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-curl_4.1.2-6_mipsel.deb
stable/main/binary-mipsel/php4-snmp_4.1.2-6_mipsel.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-mips/php4-domxml_4.1.2-6_mips.deb
stable/main/binary-mips/php4_4.1.2-6_mips.deb
stable/main/binary-mips/php4-xslt_4.1.2-6_mips.deb
stable/main/binary-mips/php4-imap_4.1.2-6_mips.deb
stable/main/binary-mips/php4-odbc_4.1.2-6_mips.deb
stable/main/binary-mips/php4-recode_4.1.2-6_mips.deb
stable/main/binary-mips/php4-sybase_4.1.2-6_mips.deb
stable/main/binary-mips/php4-gd_4.1.2-6_mips.deb
stable/main/binary-mips/caudium-php4_4.1.2-6_mips.deb
stable/main/binary-mips/php4-cgi_4.1.2-6_mips.deb
stable/main/binary-mips/php4-curl_4.1.2-6_mips.deb
stable/main/binary-mips/php4-ldap_4.1.2-6_mips.deb
stable/main/binary-mips/php4-mcal_4.1.2-6_mips.deb
stable/main/binary-mips/php4-mhash_4.1.2-6_mips.deb
stable/main/binary-mips/php4-snmp_4.1.2-6_mips.deb
stable/main/binary-mips/php4-mysql_4.1.2-6_mips.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-m68k/caudium-php4_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-domxml_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-mysql_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-sybase_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-gd_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-odbc_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-cgi_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-ldap_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-recode_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-mcal_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-curl_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-mhash_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-xslt_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-imap_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4_4.1.2-6_m68k.deb
stable/main/binary-m68k/php4-snmp_4.1.2-6_m68k.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-ia64/php4-xslt_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-cgi_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-mysql_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-domxml_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-recode_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-sybase_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-snmp_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-odbc_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-mhash_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-curl_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-ldap_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-mcal_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-imap_4.1.2-6_ia64.deb
stable/main/binary-ia64/caudium-php4_4.1.2-6_ia64.deb
stable/main/binary-ia64/php4-gd_4.1.2-6_ia64.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-hppa/php4-imap_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-domxml_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-cgi_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-mysql_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-sybase_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-odbc_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-ldap_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-recode_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-snmp_4.1.2-6_hppa.deb
stable/main/binary-hppa/caudium-php4_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-gd_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-curl_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-mhash_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-xslt_4.1.2-6_hppa.deb
stable/main/binary-hppa/php4-mcal_4.1.2-6_hppa.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-arm/php4-odbc_4.1.2-6_arm.deb
stable/main/binary-arm/php4-ldap_4.1.2-6_arm.deb
stable/main/binary-arm/php4-sybase_4.1.2-6_arm.deb
stable/main/binary-arm/caudium-php4_4.1.2-6_arm.deb
stable/main/binary-arm/php4-mysql_4.1.2-6_arm.deb
stable/main/binary-arm/php4-snmp_4.1.2-6_arm.deb
stable/main/binary-arm/php4-domxml_4.1.2-6_arm.deb
stable/main/binary-arm/php4-recode_4.1.2-6_arm.deb
stable/main/binary-arm/php4-gd_4.1.2-6_arm.deb
stable/main/binary-arm/php4_4.1.2-6_arm.deb
stable/main/binary-arm/php4-xslt_4.1.2-6_arm.deb
stable/main/binary-arm/php4-cgi_4.1.2-6_arm.deb
stable/main/binary-arm/php4-imap_4.1.2-6_arm.deb
stable/main/binary-arm/php4-mcal_4.1.2-6_arm.deb
stable/main/binary-arm/php4-mhash_4.1.2-6_arm.deb
stable/main/binary-arm/php4-curl_4.1.2-6_arm.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-alpha/php4-ldap_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-imap_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-mhash_4.1.2-6_alpha.deb
stable/main/binary-alpha/caudium-php4_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-domxml_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-mcal_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-curl_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-snmp_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-gd_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-cgi_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-mysql_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-recode_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-xslt_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-odbc_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4-sybase_4.1.2-6_alpha.deb
stable/main/binary-alpha/php4_4.1.2-6_alpha.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-powerpc/php4-mcal_4.1.2-6_powerpc.deb
stable/main/binary-powerpc/php4-mysql_4.1.2-6_powerpc.deb
stable/main/binary-i386/php4-gd_4.1.2-6_i386.deb
stable/main/binary-i386/php4_4.1.2-6_i386.deb
stable/main/binary-i386/php4-domxml_4.1.2-6_i386.deb
stable/main/binary-all/php4-pear_4.1.2-6_all.deb
stable/main/binary-i386/php4-ldap_4.1.2-6_i386.deb
stable/main/binary-all/php4-dev_4.1.2-6_all.deb
stable/main/binary-powerpc/php4-snmp_4.1.2-6_powerpc.deb
stable/main/binary-i386/php4-curl_4.1.2-6_i386.deb
stable/main/source/php4_4.1.2-6.dsc
stable/main/binary-powerpc/php4-sybase_4.1.2-6_powerpc.deb
stable/main/binary-i386/php4-mcal_4.1.2-6_i386.deb
stable/main/binary-i386/php4-imap_4.1.2-6_i386.deb
stable/main/binary-i386/php4-mysql_4.1.2-6_i386.deb
stable/main/binary-powerpc/php4-xslt_4.1.2-6_powerpc.deb
stable/main/binary-powerpc/php4-recode_4.1.2-6_powerpc.deb
stable/main/binary-powerpc/php4-odbc_4.1.2-6_powerpc.deb
stable/main/binary-i386/php4-snmp_4.1.2-6_i386.deb
stable/main/binary-i386/php4-sybase_4.1.2-6_i386.deb
stable/main/binary-i386/caudium-php4_4.1.2-6_i386.deb
stable/main/binary-powerpc/php4-ldap_4.1.2-6_powerpc.deb
stable/main/binary-powerpc/php4_4.1.2-6_powerpc.deb
stable/main/binary-powerpc/php4-mhash_4.1.2-6_powerpc.deb
stable/main/source/php4_4.1.2-6.diff.gz
stable/main/binary-powerpc/php4-gd_4.1.2-6_powerpc.deb
stable/main/binary-i386/php4-xslt_4.1.2-6_i386.deb
stable/main/binary-powerpc/php4-domxml_4.1.2-6_powerpc.deb
stable/main/binary-powerpc/php4-curl_4.1.2-6_powerpc.deb
stable/main/binary-i386/php4-cgi_4.1.2-6_i386.deb
stable/main/binary-i386/php4-recode_4.1.2-6_i386.deb
stable/main/binary-i386/php4-odbc_4.1.2-6_i386.deb
stable/main/binary-powerpc/php4-cgi_4.1.2-6_powerpc.deb
stable/main/binary-powerpc/caudium-php4_4.1.2-6_powerpc.deb
stable/main/binary-powerpc/php4-imap_4.1.2-6_powerpc.deb
stable/main/binary-i386/php4-mhash_4.1.2-6_i386.deb
php4 (4:4.1.2-6) stable; urgency=low
  * Backport fix from 4.2.3 to avoid using pread() and pwrite() functions
    from glibc, as they are broken on many architectures in Debian.
    - The patch is an 8-line change that simply removes pread() and pwrite()
      calls in ext/session/mod_files.c
    - This should finally fix the "sessions don't work on $arch" bug (which
      was a serious regression between Potato and Woody), so people can stop
      following up to it.  (closes: #121391)


stable/main/binary-sparc/php3-cgi_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-cgi-ldap_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-mhash_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-cgi-imap_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-cgi-mhash_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-cgi-gd_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-xml_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-gd_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-cgi-xml_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-ldap_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-cgi-mysql_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-cgi-magick_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-magick_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-snmp_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-mysql_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-cgi-snmp_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-dev_3.0.18-23.1woody1_sparc.deb
stable/main/binary-sparc/php3-imap_3.0.18-23.1woody1_sparc.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-s390/php3-dev_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-snmp_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-xml_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-ldap_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-imap_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-gd_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-cgi-gd_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-cgi-xml_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-cgi-ldap_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-mhash_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-mysql_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-magick_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-cgi-magick_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-cgi-snmp_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-cgi-mysql_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-cgi-imap_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-cgi-mhash_3.0.18-23.1woody1_s390.deb
stable/main/binary-s390/php3-cgi_3.0.18-23.1woody1_s390.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-powerpc/php3-ldap_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-cgi-xml_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-cgi-snmp_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-cgi-magick_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-mysql_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-dev_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-gd_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-xml_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-imap_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-snmp_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-cgi-mysql_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-cgi-gd_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-cgi_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-magick_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-cgi-ldap_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-mhash_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-cgi-imap_3.0.18-23.1woody1_powerpc.deb
stable/main/binary-powerpc/php3-cgi-mhash_3.0.18-23.1woody1_powerpc.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-mipsel/php3-mysql_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-snmp_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-gd_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-xml_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-imap_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-dev_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-magick_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-cgi-gd_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-ldap_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-cgi-xml_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-cgi-ldap_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-cgi-imap_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-cgi-mhash_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-cgi-mysql_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-cgi-snmp_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-mhash_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-cgi_3.0.18-23.1woody1_mipsel.deb
stable/main/binary-mipsel/php3-cgi-magick_3.0.18-23.1woody1_mipsel.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-mips/php3-gd_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-magick_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-imap_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-ldap_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-cgi-ldap_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-mhash_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-dev_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-cgi-mysql_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-cgi-xml_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-snmp_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-cgi-imap_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-xml_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-cgi-gd_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-cgi-magick_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-cgi-mhash_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-cgi-snmp_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-mysql_3.0.18-23.1woody1_mips.deb
stable/main/binary-mips/php3-cgi_3.0.18-23.1woody1_mips.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-m68k/php3-cgi-gd_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-cgi_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-cgi-mysql_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-dev_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-cgi-ldap_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-cgi-magick_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-imap_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-cgi-snmp_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-cgi-mhash_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-ldap_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-cgi-xml_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-cgi-imap_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-mhash_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-xml_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-mysql_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-magick_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-gd_3.0.18-23.1woody1_m68k.deb
stable/main/binary-m68k/php3-snmp_3.0.18-23.1woody1_m68k.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-ia64/php3-dev_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-cgi-ldap_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-magick_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-mhash_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-cgi-mysql_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-cgi_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-imap_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-gd_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-mysql_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-xml_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-snmp_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-cgi-mhash_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-cgi-magick_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-cgi-gd_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-cgi-xml_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-cgi-imap_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-ldap_3.0.18-23.1woody1_ia64.deb
stable/main/binary-ia64/php3-cgi-snmp_3.0.18-23.1woody1_ia64.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-hppa/php3-cgi-xml_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-imap_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-cgi_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-cgi-ldap_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-cgi-snmp_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-cgi-imap_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-cgi-magick_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-cgi-mhash_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-xml_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-ldap_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-dev_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-magick_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-mysql_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-mhash_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-snmp_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-cgi-gd_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-gd_3.0.18-23.1woody1_hppa.deb
stable/main/binary-hppa/php3-cgi-mysql_3.0.18-23.1woody1_hppa.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-arm/php3-cgi-mysql_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-cgi-magick_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-imap_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-gd_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-ldap_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-dev_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-cgi_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-cgi-snmp_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-xml_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-mysql_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-cgi-ldap_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-cgi-xml_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-cgi-gd_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-mhash_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-magick_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-cgi-imap_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-snmp_3.0.18-23.1woody1_arm.deb
stable/main/binary-arm/php3-cgi-mhash_3.0.18-23.1woody1_arm.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-alpha/php3-cgi-imap_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-cgi-xml_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-snmp_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-cgi-gd_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-magick_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-xml_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-ldap_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-cgi-mhash_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-imap_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-cgi-ldap_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-mysql_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-cgi-snmp_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-gd_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-cgi-magick_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-cgi_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-cgi-mysql_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-dev_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3_3.0.18-23.1woody1_alpha.deb
stable/main/binary-alpha/php3-mhash_3.0.18-23.1woody1_alpha.deb
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-i386/php3-dev_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-cgi-xml_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-cgi-mysql_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-cgi-snmp_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-cgi-mhash_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-ldap_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-xml_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-mysql_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-cgi_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-cgi-ldap_3.0.18-23.1woody1_i386.deb
stable/main/source/php3_3.0.18-23.1woody1.dsc
stable/main/binary-all/php3-doc_3.0.18-23.1woody1_all.deb
stable/main/binary-i386/php3-cgi-gd_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-mhash_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-imap_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-cgi-magick_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-gd_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-magick_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-cgi-imap_3.0.18-23.1woody1_i386.deb
stable/main/binary-i386/php3-snmp_3.0.18-23.1woody1_i386.deb
stable/main/source/php3_3.0.18-23.1woody1.diff.gz
php3 (3:3.0.18-23.1woody1) stable-security; urgency=high
  * Non-maintainer upload by the security team
  * Backport security fixes from 4.2.3+ to stop CR/LF injection
    - Strip control characters from To and Subject fields in mail()
    - Strip control characters from URLs in fopen()


stable/main/binary-i386/pcmcia-modules-2.2.22_3.1.33-6k1_i386.deb
pcmcia-cs (3.1.33-6) unstable; urgency=high
  * Built for kernel-image-2.2.22.


stable/main/binary-i386/pcmcia-modules-2.2.22-idepci_3.1.33-6k1_i386.deb
pcmcia-cs (3.1.33-6) unstable; urgency=high
  * Built for kernel-image-2.2.22-idepci.


stable/main/binary-i386/pcmcia-modules-2.2.22-compact_3.1.33-6k1_i386.deb
pcmcia-cs (3.1.33-6) unstable; urgency=high
  * Built for kernel-image-2.2.22-compact.


stable/main/binary-ia64/ssh_3.4p1-1_ia64.deb
stable/main/binary-ia64/ssh-askpass-gnome_3.4p1-1_ia64.deb
openssh (1:3.4p1-1) testing; urgency=high
  * Extend my tendrils back into this package (Closes: #150915, #151098)
  * thanks to the security team for their work
  * no thanks to ISS/Theo de Raadt for their handling of these bugs
  * save old sshd_configs to sshd_config.dpkg-old when auto-generating a
    new one
  * tell/ask the user about PriviledgeSeparation
  * /etc/init.d/ssh run will now create the chroot empty dir if necessary
  * Remove our previous statoverride on /usr/bin/ssh (only for people
    upgrading from a version where we'd put one in ourselves!)
  * Stop slandering Russia, since someone asked so nicely (Closes: #148951)
  * Reduce the sleep time in /etc/init.d/ssh during a restart


stable/main/binary-sparc/openafs-fileserver_1.2.3final2-6_sparc.deb
stable/main/binary-sparc/openafs-dbserver_1.2.3final2-6_sparc.deb
stable/main/binary-sparc/libopenafs-dev_1.2.3final2-6_sparc.deb
stable/main/binary-sparc/openafs-kpasswd_1.2.3final2-6_sparc.deb
stable/main/binary-sparc/openafs-client_1.2.3final2-6_sparc.deb
openafs (1.2.3final2-6) stable-security; urgency=high
  * Security problem: fix XDR buffer overflow based on upstream advisory.


stable/main/binary-s390/libopenafs-dev_1.2.3final2-6_s390.deb
stable/main/binary-s390/openafs-fileserver_1.2.3final2-6_s390.deb
stable/main/binary-s390/openafs-kpasswd_1.2.3final2-6_s390.deb
stable/main/binary-s390/openafs-dbserver_1.2.3final2-6_s390.deb
stable/main/binary-s390/openafs-client_1.2.3final2-6_s390.deb
openafs (1.2.3final2-6) stable-security; urgency=high
  * Security problem: fix XDR buffer overflow based on upstream advisory.


stable/main/binary-powerpc/openafs-kpasswd_1.2.3final2-6_powerpc.deb
stable/main/binary-powerpc/openafs-client_1.2.3final2-6_powerpc.deb
stable/main/binary-powerpc/openafs-dbserver_1.2.3final2-6_powerpc.deb
stable/main/binary-powerpc/openafs-fileserver_1.2.3final2-6_powerpc.deb
stable/main/binary-powerpc/libopenafs-dev_1.2.3final2-6_powerpc.deb
openafs (1.2.3final2-6) stable-security; urgency=high
  * Security problem: fix XDR buffer overflow based on upstream advisory.


stable/main/binary-alpha/openafs-dbserver_1.2.3final2-6_alpha.deb
stable/main/binary-alpha/openafs-fileserver_1.2.3final2-6_alpha.deb
stable/main/binary-alpha/libopenafs-dev_1.2.3final2-6_alpha.deb
stable/main/binary-alpha/openafs-client_1.2.3final2-6_alpha.deb
stable/main/binary-alpha/openafs-kpasswd_1.2.3final2-6_alpha.deb
openafs (1.2.3final2-6) stable-security; urgency=high
  * Security problem: fix XDR buffer overflow based on upstream advisory.


stable/main/binary-i386/openafs-fileserver_1.2.3final2-6_i386.deb
stable/main/binary-i386/libopenafs-dev_1.2.3final2-6_i386.deb
stable/main/binary-i386/openafs-dbserver_1.2.3final2-6_i386.deb
stable/main/binary-i386/openafs-kpasswd_1.2.3final2-6_i386.deb
stable/main/source/openafs_1.2.3final2-6.dsc
stable/main/binary-all/openafs-modules-source_1.2.3final2-6_all.deb
stable/main/binary-i386/openafs-client_1.2.3final2-6_i386.deb
stable/main/source/openafs_1.2.3final2-6.diff.gz
openafs (1.2.3final2-6) stable-security; urgency=high
  * Security problem: fix XDR buffer overflow based on upstream advisory.


stable/main/binary-sparc/octave2.1_2.1.35-7woody1_sparc.deb
stable/main/binary-sparc/octave2.1-headers_2.1.35-7woody1_sparc.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-s390/octave2.1-headers_2.1.35-7woody1_s390.deb
stable/main/binary-s390/octave2.1_2.1.35-7woody1_s390.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-powerpc/octave2.1_2.1.35-7woody1_powerpc.deb
stable/main/binary-powerpc/octave2.1-headers_2.1.35-7woody1_powerpc.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-mipsel/octave2.1_2.1.35-7woody1_mipsel.deb
stable/main/binary-mipsel/octave2.1-headers_2.1.35-7woody1_mipsel.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-mips/octave2.1-headers_2.1.35-7woody1_mips.deb
stable/main/binary-mips/octave2.1_2.1.35-7woody1_mips.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-m68k/octave2.1_2.1.35-7woody1_m68k.deb
stable/main/binary-m68k/octave2.1-headers_2.1.35-7woody1_m68k.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-ia64/octave2.1_2.1.35-7woody1_ia64.deb
stable/main/binary-ia64/octave2.1-headers_2.1.35-7woody1_ia64.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-hppa/octave2.1-headers_2.1.35-7woody1_hppa.deb
stable/main/binary-hppa/octave2.1_2.1.35-7woody1_hppa.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-alpha/octave2.1-headers_2.1.35-7woody1_alpha.deb
stable/main/binary-alpha/octave2.1_2.1.35-7woody1_alpha.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-i386/octave2.1_2.1.35-7woody1_i386.deb
stable/main/source/octave2.1_2.1.35-7woody1.dsc
stable/main/binary-all/octave2.1-htmldoc_2.1.35-7woody1_all.deb
stable/main/binary-i386/octave2.1-headers_2.1.35-7woody1_i386.deb
stable/main/binary-all/octave2.1-info_2.1.35-7woody1_all.deb
stable/main/binary-all/octave2.1-emacsen_2.1.35-7woody1_all.deb
stable/main/source/octave2.1_2.1.35-7woody1.diff.gz
stable/main/binary-all/octave2.1-doc_2.1.35-7woody1_all.deb
octave2.1 (2.1.35-7woody1) stable; urgency=medium
  * Rebuilt against current atlas*-dev package with corrected
    shlibs.default to ensure proper handling of virtual depends
    on blas2 with default of blas and atlas2-base
  * Applied Debian changes made since Debian 3.0 froze:
    - debian/octave2.1-emacsen.emacsen-startup: Autoload octave-hlp under
      the correct function label of octave-help (from 2.1.36-5)
    - debian/{rules,control}: Don't configure Atlas on arm (from 2.1.36-5)
    - debian/rules: Configure --with-lapack=/usr/lib/liblapack2.so (2.1.36-4)
    - debian/control: Build-Depends on atlas2-base-dev (from 2.1.36-3)
    - debian/rules: Configure --with-blas=/usr/lib/libblas2.so (2.1.36-3)
    - debian/control: Build-Depends on texi2html (2.1.36-1)
  * And strictly no new upstream code making this a stable release


stable/main/binary-sparc/ocaml_3.04-14_sparc.deb
stable/main/binary-sparc/ocaml-native-compilers_3.04-14_sparc.deb
stable/main/binary-sparc/ocaml-base_3.04-14_sparc.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-s390/ocaml-base_3.04-14_s390.deb
stable/main/binary-s390/ocaml_3.04-14_s390.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-powerpc/ocaml-native-compilers_3.04-14_powerpc.deb
stable/main/binary-powerpc/ocaml_3.04-14_powerpc.deb
stable/main/binary-powerpc/ocaml-base_3.04-14_powerpc.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-mipsel/ocaml-base_3.04-14_mipsel.deb
stable/main/binary-mipsel/ocaml_3.04-14_mipsel.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-mips/ocaml-base_3.04-14_mips.deb
stable/main/binary-mips/ocaml_3.04-14_mips.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-m68k/ocaml_3.04-14_m68k.deb
stable/main/binary-m68k/ocaml-base_3.04-14_m68k.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-ia64/ocaml-base_3.04-14_ia64.deb
stable/main/binary-ia64/ocaml_3.04-14_ia64.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-i386/ocaml-base_3.04-14_i386.deb
stable/main/binary-i386/ocaml-native-compilers_3.04-14_i386.deb
stable/main/binary-i386/ocaml_3.04-14_i386.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-hppa/ocaml-base_3.04-14_hppa.deb
stable/main/binary-hppa/ocaml_3.04-14_hppa.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-arm/ocaml_3.04-14_arm.deb
stable/main/binary-arm/ocaml-base_3.04-14_arm.deb
stable/main/binary-arm/ocaml-native-compilers_3.04-14_arm.deb
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-all/ocaml-source_3.04-14_all.deb
stable/main/source/ocaml_3.04-14.diff.gz
stable/main/binary-alpha/ocaml-base_3.04-14_alpha.deb
stable/main/binary-alpha/ocaml_3.04-14_alpha.deb
stable/main/binary-alpha/ocaml-native-compilers_3.04-14_alpha.deb
stable/main/source/ocaml_3.04-14.dsc
ocaml (3.04-14) stable; urgency=high
  * Fixed postinst-ocamlld so it will now do its work also when upgrading a
    package, and not only when removing it.


stable/main/binary-s390/nullmailer_1.00RC5-16.1woody2_s390.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-powerpc/nullmailer_1.00RC5-16.1woody2_powerpc.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-mipsel/nullmailer_1.00RC5-16.1woody2_mipsel.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-mips/nullmailer_1.00RC5-16.1woody2_mips.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-m68k/nullmailer_1.00RC5-16.1woody2_m68k.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-ia64/nullmailer_1.00RC5-16.1woody2_ia64.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-i386/nullmailer_1.00RC5-16.1woody2_i386.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-hppa/nullmailer_1.00RC5-16.1woody2_hppa.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-arm/nullmailer_1.00RC5-16.1woody2_arm.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-alpha/nullmailer_1.00RC5-16.1woody2_alpha.deb
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-sparc/nullmailer_1.00RC5-16.1woody2_sparc.deb
stable/main/source/nullmailer_1.00RC5-16.1woody2.diff.gz
stable/main/source/nullmailer_1.00RC5-16.1woody2.dsc
nullmailer (1.00RC5-16.1woody2) stable-security; urgency=high
  * Security fix, prevents possible denial of service attack, closes: #160127.
  * Security fix, corrected spooldir permissions.
  * Set new maintainer in debian/control.


stable/main/binary-s390/nis_3.9-6.1_s390.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-powerpc/nis_3.9-6.1_powerpc.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-mipsel/nis_3.9-6.1_mipsel.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-mips/nis_3.9-6.1_mips.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-m68k/nis_3.9-6.1_m68k.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-ia64/nis_3.9-6.1_ia64.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-i386/nis_3.9-6.1_i386.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-hppa/nis_3.9-6.1_hppa.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-arm/nis_3.9-6.1_arm.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-alpha/nis_3.9-6.1_alpha.deb
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-sparc/nis_3.9-6.1_sparc.deb
stable/main/source/nis_3.9-6.1.dsc
stable/main/source/nis_3.9-6.1.diff.gz
nis (3.9-6.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied fix by Thorsten Kukuk to fix an information leak


stable/main/binary-s390/libnessus-dev_1.0.10-2.0.1_s390.deb
stable/main/binary-s390/libnessus1_1.0.10-2.0.1_s390.deb
nessus-libraries (1.0.10-2.0.1) stable; urgency=low
  * Binary NMU to get rid of the libgmp3 library name, so that
    nessus-core builds.


stable/main/binary-s390/nessusd_1.0.10-2.0.1_s390.deb
stable/main/binary-s390/nessus_1.0.10-2.0.1_s390.deb
nessus-core (1.0.10-2.0.1) stable; urgency=low
  * Binary NMU to get rid of the libgmp3 library name using a rebuilt
    nessus-libraries package.


stable/main/binary-powerpc/nessusd_1.0.10-2_powerpc.deb
stable/main/binary-powerpc/nessus_1.0.10-2_powerpc.deb
nessus-core (1.0.10-2) unstable; urgency=low
  * Moved to main. The only component of Nessus that needed non-US was
    an encryption layer library within the libnessus package.


stable/main/binary-sparc/murasaki_0.5.4-2.1_sparc.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-s390/murasaki_0.5.4-2.1_s390.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-powerpc/murasaki_0.5.4-2.1_powerpc.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-mipsel/murasaki_0.5.4-2.1_mipsel.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-mips/murasaki_0.5.4-2.1_mips.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-m68k/murasaki_0.5.4-2.1_m68k.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-ia64/murasaki_0.5.4-2.1_ia64.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-hppa/murasaki_0.5.4-2.1_hppa.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-arm/murasaki_0.5.4-2.1_arm.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-alpha/murasaki_0.5.4-2.1_alpha.deb
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/source/murasaki_0.5.4-2.1.diff.gz
stable/main/binary-i386/murasaki_0.5.4-2.1_i386.deb
stable/main/source/murasaki_0.5.4-2.1.dsc
murasaki (0.5.4-2.1) stable; urgency=low
  * NMU
  * Init script now exists silently if hotplug isn't supported by the
    kernel (closes: #150615)


stable/main/binary-sparc/muddleftpd_1.3.11-7woody2_sparc.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/binary-s390/muddleftpd_1.3.11-7woody2_s390.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/binary-powerpc/muddleftpd_1.3.11-7woody2_powerpc.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/binary-mipsel/muddleftpd_1.3.11-7woody2_mipsel.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/binary-mips/muddleftpd_1.3.11-7woody2_mips.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/binary-m68k/muddleftpd_1.3.11-7woody2_m68k.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/binary-ia64/muddleftpd_1.3.11-7woody2_ia64.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/binary-hppa/muddleftpd_1.3.11-7woody2_hppa.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/binary-arm/muddleftpd_1.3.11-7woody2_arm.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/binary-alpha/muddleftpd_1.3.11-7woody2_alpha.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/main/source/muddleftpd_1.3.11-7woody2.diff.gz
stable/main/source/muddleftpd_1.3.11-7woody2.dsc
stable/main/binary-i386/muddleftpd_1.3.11-7woody2_i386.deb
muddleftpd (1.3.11-7woody2) stable-security; urgency=low
  * Another fix for the logfile, "backported" from upstream 1.3.12.1.


stable/contrib/source/msttcorefonts_1.0.2.tar.gz
stable/contrib/binary-all/msttcorefonts_1.0.2_all.deb
stable/contrib/source/msttcorefonts_1.0.2.dsc
msttcorefonts (1.0.2) stable; urgency=low
  * change base URL, Closes: #165926


stable/main/binary-s390/mpqc_2.0.4-1.1_s390.deb
stable/main/binary-s390/libsc2_2.0.4-1.1_s390.deb
stable/main/binary-s390/libsc-dev_2.0.4-1.1_s390.deb
mpqc (2.0.4-1.1) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Rebuilt against current atlas-dev from stable to fix broken
    dependencies
  * Applied patch from Rick Younie to fix build problems on m68k (see
    Bug#146040)
  * No code changes


stable/main/binary-powerpc/mpqc_2.0.4-1.1_powerpc.deb
stable/main/binary-powerpc/libsc2_2.0.4-1.1_powerpc.deb
stable/main/binary-powerpc/libsc-dev_2.0.4-1.1_powerpc.deb
mpqc (2.0.4-1.1) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Rebuilt against current atlas-dev from stable to fix broken
    dependencies
  * Applied patch from Rick Younie to fix build problems on m68k (see
    Bug#146040)
  * No code changes


stable/main/binary-m68k/libsc-dev_2.0.4-1.1_m68k.deb
stable/main/binary-m68k/mpqc_2.0.4-1.1_m68k.deb
stable/main/binary-m68k/libsc2_2.0.4-1.1_m68k.deb
mpqc (2.0.4-1.1) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Rebuilt against current atlas-dev from stable to fix broken
    dependencies
  * Applied patch from Rick Younie to fix build problems on m68k (see
    Bug#146040)
  * No code changes


stable/main/binary-ia64/libsc-dev_2.0.4-1.1_ia64.deb
stable/main/binary-ia64/mpqc_2.0.4-1.1_ia64.deb
stable/main/binary-ia64/libsc2_2.0.4-1.1_ia64.deb
mpqc (2.0.4-1.1) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Rebuilt against current atlas-dev from stable to fix broken
    dependencies
  * Applied patch from Rick Younie to fix build problems on m68k (see
    Bug#146040)
  * No code changes


stable/main/binary-i386/libsc2_2.0.4-1.1_i386.deb
stable/main/binary-i386/libsc-dev_2.0.4-1.1_i386.deb
stable/main/binary-i386/mpqc_2.0.4-1.1_i386.deb
mpqc (2.0.4-1.1) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Rebuilt against current atlas-dev from stable to fix broken
    dependencies
  * Applied patch from Rick Younie to fix build problems on m68k (see
    Bug#146040)
  * No code changes


stable/main/binary-hppa/libsc2_2.0.4-1.1_hppa.deb
stable/main/binary-hppa/libsc-dev_2.0.4-1.1_hppa.deb
stable/main/binary-hppa/mpqc_2.0.4-1.1_hppa.deb
mpqc (2.0.4-1.1) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Rebuilt against current atlas-dev from stable to fix broken
    dependencies
  * Applied patch from Rick Younie to fix build problems on m68k (see
    Bug#146040)
  * No code changes


stable/main/binary-sparc/libsc2_2.0.4-1.1_sparc.deb
stable/main/binary-sparc/libsc-dev_2.0.4-1.1_sparc.deb
stable/main/source/mpqc_2.0.4-1.1.diff.gz
stable/main/binary-all/libsc-doc_2.0.4-1.1_all.deb
stable/main/binary-sparc/mpqc_2.0.4-1.1_sparc.deb
stable/main/source/mpqc_2.0.4-1.1.dsc
mpqc (2.0.4-1.1) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Rebuilt against current atlas-dev from stable to fix broken
    dependencies
  * Applied patch from Rick Younie to fix build problems on m68k (see
    Bug#146040)
  * No code changes


stable/main/binary-sparc/mpack_1.5-7woody2_sparc.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-s390/mpack_1.5-7woody2_s390.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-powerpc/mpack_1.5-7woody2_powerpc.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-mipsel/mpack_1.5-7woody2_mipsel.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-mips/mpack_1.5-7woody2_mips.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-ia64/mpack_1.5-7woody2_ia64.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-i386/mpack_1.5-7woody2_i386.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-hppa/mpack_1.5-7woody2_hppa.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-arm/mpack_1.5-7woody2_arm.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-alpha/mpack_1.5-7woody2_alpha.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/source/mpack_1.5-7woody2.diff.gz
stable/main/source/mpack_1.5-7woody2.dsc
stable/main/binary-m68k/mpack_1.5-7woody2_m68k.deb
mpack (1.5-7woody2) stable-security; urgency=high
  * Fix buffer overflow in parsing of MIME headers. (1.5-7woody1)
  * Do not accept disposition filenames like "../a".
    Security impact is limited because only a single leading "../"
    was accepted.  (reported by Herbert Xu)


stable/main/binary-s390/libmm11-dev_1.1.3-6.1_s390.deb
stable/main/binary-s390/libmm11_1.1.3-6.1_s390.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/binary-powerpc/libmm11_1.1.3-6.1_powerpc.deb
stable/main/binary-powerpc/libmm11-dev_1.1.3-6.1_powerpc.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/binary-mipsel/libmm11-dev_1.1.3-6.1_mipsel.deb
stable/main/binary-mipsel/libmm11_1.1.3-6.1_mipsel.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/binary-mips/libmm11-dev_1.1.3-6.1_mips.deb
stable/main/binary-mips/libmm11_1.1.3-6.1_mips.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/binary-m68k/libmm11_1.1.3-6.1_m68k.deb
stable/main/binary-m68k/libmm11-dev_1.1.3-6.1_m68k.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/binary-ia64/libmm11-dev_1.1.3-6.1_ia64.deb
stable/main/binary-ia64/libmm11_1.1.3-6.1_ia64.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/binary-i386/libmm11_1.1.3-6.1_i386.deb
stable/main/binary-i386/libmm11-dev_1.1.3-6.1_i386.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/binary-hppa/libmm11-dev_1.1.3-6.1_hppa.deb
stable/main/binary-hppa/libmm11_1.1.3-6.1_hppa.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/binary-arm/libmm11-dev_1.1.3-6.1_arm.deb
stable/main/binary-arm/libmm11_1.1.3-6.1_arm.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/binary-alpha/libmm11-dev_1.1.3-6.1_alpha.deb
stable/main/binary-alpha/libmm11_1.1.3-6.1_alpha.deb
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/source/mm_1.1.3-6.1.dsc
stable/main/binary-sparc/libmm11-dev_1.1.3-6.1_sparc.deb
stable/main/binary-sparc/libmm11_1.1.3-6.1_sparc.deb
stable/main/source/mm_1.1.3-6.1.diff.gz
mm (1.1.3-6.1) stable-security; urgency=high
  * Applied patch from Sebastian Krahmer and Roman Drahtmueller, SuSE
    Security, that fixes a temporary file race condition, i.e. insecure
    creation of temporary files in a publically writable directory.


stable/main/source/mhonarc_2.5.2-1.2.diff.gz
stable/main/source/mhonarc_2.5.2-1.2.dsc
stable/main/binary-all/mhonarc_2.5.2-1.2_all.deb
mhonarc (2.5.2-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Make sure to htmlize name parameter to avoid any potential
    XSS. (upstream)
  * XSS vulnerability with message header fields fixed: Message header
    field names were not escaped during conversion to HTML.  Hence,
    an attacker could including scripting markup in the message
    header. (upstream)


stable/main/binary-s390/masqmail_0.1.16-2.1_s390.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-powerpc/masqmail_0.1.16-2.1_powerpc.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-mipsel/masqmail_0.1.16-2.1_mipsel.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-mips/masqmail_0.1.16-2.1_mips.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-m68k/masqmail_0.1.16-2.1_m68k.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-ia64/masqmail_0.1.16-2.1_ia64.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-i386/masqmail_0.1.16-2.1_i386.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-hppa/masqmail_0.1.16-2.1_hppa.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-arm/masqmail_0.1.16-2.1_arm.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-alpha/masqmail_0.1.16-2.1_alpha.deb
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/source/masqmail_0.1.16-2.1.diff.gz
stable/main/binary-sparc/masqmail_0.1.16-2.1_sparc.deb
stable/main/source/masqmail_0.1.16-2.1.dsc
masqmail (0.1.16-2.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backported upstream fixes to several buffer overflows


stable/main/binary-all/mantis_0.17.1-2.5_all.deb
stable/main/source/mantis_0.17.1-2.5.diff.gz
stable/main/source/mantis_0.17.1-2.5.dsc
mantis (0.17.1-2.5) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream changes to fix privilege escalation with private
    bugs (Mantis Advisory/2002-06)
  * Applied upstream changes to privilege escalation when no projects are
    accessable to the user (Mantis Advisory/2002-07)
  * Applied upstream fixes to fix the problem that Mantis ignores settings
    here and there (Mantis Advisory/2002-08)
  * Removed whitespace at the end of core_user_API.php (closes:
    Bug#159369)
  * Modified patches and files so dpkg-source doesn't complain about
    missing newlines anymore, gnarf.


stable/main/binary-s390/mailman_2.0.11-1woody5_s390.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/binary-powerpc/mailman_2.0.11-1woody5_powerpc.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/binary-mipsel/mailman_2.0.11-1woody5_mipsel.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/binary-mips/mailman_2.0.11-1woody5_mips.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/binary-m68k/mailman_2.0.11-1woody5_m68k.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/binary-ia64/mailman_2.0.11-1woody5_ia64.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/binary-i386/mailman_2.0.11-1woody5_i386.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/binary-hppa/mailman_2.0.11-1woody5_hppa.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/binary-arm/mailman_2.0.11-1woody5_arm.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/binary-alpha/mailman_2.0.11-1woody5_alpha.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/source/mailman_2.0.11-1woody5.dsc
stable/main/source/mailman_2.0.11-1woody5.diff.gz
stable/main/binary-sparc/mailman_2.0.11-1woody5_sparc.deb
mailman (2.0.11-1woody5) stable; urgency=medium
  * Non-maintainer upload by stable release manager
  * Fixed permissions on /var/lock/mailman which rendered the package in
    stable unusable


stable/main/source/luxman_0.41-17.1.diff.gz
stable/main/binary-i386/luxman_0.41-17.1_i386.deb
stable/main/source/luxman_0.41-17.1.dsc
luxman (0.41-17.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Use the full path for gzip to fix local root exploit in maped.  Thanks
    to iDEFENSE for reporting this.


stable/main/binary-sparc/logtool_1.0.6-7.woody.1_sparc.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-s390/logtool_1.0.6-7.woody.1_s390.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-powerpc/logtool_1.0.6-7.woody.1_powerpc.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-mipsel/logtool_1.0.6-7.woody.1_mipsel.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-mips/logtool_1.0.6-7.woody.1_mips.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-m68k/logtool_1.0.6-7.woody.1_m68k.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-ia64/logtool_1.0.6-7.woody.1_ia64.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-hppa/logtool_1.0.6-7.woody.1_hppa.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-arm/logtool_1.0.6-7.woody.1_arm.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-alpha/logtool_1.0.6-7.woody.1_alpha.deb
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-i386/logtool_1.0.6-7.woody.1_i386.deb
stable/main/source/logtool_1.0.6-7.woody.1.dsc
stable/main/source/logtool_1.0.6-7.woody.1.diff.gz
logtool (1.0.6-7.woody.1) stable; urgency=low
  * Backported fix for file-existence-error bug from unstable version.
    (Closes: #153414). Release manager: this is just a one-character
    change from 'test -f' to 'test -L', where the latter is the right
    thing to do, is being done so for the other three cases, and works as is
    for a few months now in unstable


stable/main/binary-s390/log2mail_0.2.5.1_s390.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-powerpc/log2mail_0.2.5.1_powerpc.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-mipsel/log2mail_0.2.5.1_mipsel.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-mips/log2mail_0.2.5.1_mips.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-m68k/log2mail_0.2.5.1_m68k.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-ia64/log2mail_0.2.5.1_ia64.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-i386/log2mail_0.2.5.1_i386.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-hppa/log2mail_0.2.5.1_hppa.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-arm/log2mail_0.2.5.1_arm.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-alpha/log2mail_0.2.5.1_alpha.deb
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-sparc/log2mail_0.2.5.1_sparc.deb
stable/main/source/log2mail_0.2.5.1.dsc
stable/main/source/log2mail_0.2.5.1.tar.gz
log2mail (0.2.5.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fixed two potential buffer overflows


stable/main/binary-sparc/libquota-perl_1.4.1-2_sparc.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-s390/libquota-perl_1.4.1-2_s390.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-powerpc/libquota-perl_1.4.1-2_powerpc.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-mipsel/libquota-perl_1.4.1-2_mipsel.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-mips/libquota-perl_1.4.1-2_mips.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-m68k/libquota-perl_1.4.1-2_m68k.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-ia64/libquota-perl_1.4.1-2_ia64.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-hppa/libquota-perl_1.4.1-2_hppa.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-arm/libquota-perl_1.4.1-2_arm.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-alpha/libquota-perl_1.4.1-2_alpha.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/source/libquota-perl_1.4.1-2.dsc
stable/main/source/libquota-perl_1.4.1-2.diff.gz
stable/main/binary-i386/libquota-perl_1.4.1-2_i386.deb
libquota-perl (1.4.1-2) stable; urgency=high
  * Backported change for C code from unstable version (1.4.6) to fix major
    brokenness (Closes: #162385)


stable/main/binary-s390/libpng2-dev_1.0.12-3.woody.2_s390.deb
stable/main/binary-s390/libpng2_1.0.12-3.woody.2_s390.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-powerpc/libpng2-dev_1.0.12-3.woody.2_powerpc.deb
stable/main/binary-powerpc/libpng2_1.0.12-3.woody.2_powerpc.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-mipsel/libpng2-dev_1.0.12-3.woody.2_mipsel.deb
stable/main/binary-mipsel/libpng2_1.0.12-3.woody.2_mipsel.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-mips/libpng2-dev_1.0.12-3.woody.2_mips.deb
stable/main/binary-mips/libpng2_1.0.12-3.woody.2_mips.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-m68k/libpng2_1.0.12-3.woody.2_m68k.deb
stable/main/binary-m68k/libpng2-dev_1.0.12-3.woody.2_m68k.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-ia64/libpng2-dev_1.0.12-3.woody.2_ia64.deb
stable/main/binary-ia64/libpng2_1.0.12-3.woody.2_ia64.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-i386/libpng2_1.0.12-3.woody.2_i386.deb
stable/main/binary-i386/libpng2-dev_1.0.12-3.woody.2_i386.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-hppa/libpng2-dev_1.0.12-3.woody.2_hppa.deb
stable/main/binary-hppa/libpng2_1.0.12-3.woody.2_hppa.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-arm/libpng2_1.0.12-3.woody.2_arm.deb
stable/main/binary-arm/libpng2-dev_1.0.12-3.woody.2_arm.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-alpha/libpng2_1.0.12-3.woody.2_alpha.deb
stable/main/binary-alpha/libpng2-dev_1.0.12-3.woody.2_alpha.deb
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/source/libpng_1.0.12-3.woody.2.diff.gz
stable/main/binary-sparc/libpng2-dev_1.0.12-3.woody.2_sparc.deb
stable/main/binary-sparc/libpng2_1.0.12-3.woody.2_sparc.deb
stable/main/source/libpng_1.0.12-3.woody.2.dsc
libpng (1.0.12-3.woody.2) stable-security; urgency=high
  * Applied security related patch Glenn Randers-Pehrson informed us
    about, which preserves libpng from processing too wide images.


stable/main/binary-all/libgnupg-perl_0.9-1.woody.1_all.deb
stable/main/source/libgnupg-perl_0.9-1.woody.1.diff.gz
stable/main/source/libgnupg-perl_0.9-1.woody.1.dsc
libgnupg-perl (0.9-1.woody.1) stable; urgency=low
  * Upload to stable (for woody r1).
  * Moved from non-US to main (Section: interpreters).
    (apart from the changelog this package is identical to 0.9-2)


stable/main/binary-sparc/libgd-dev_1.8.4-17.woody2_sparc.deb
stable/main/binary-sparc/libgd1-noxpm_1.8.4-17.woody2_sparc.deb
stable/main/binary-sparc/libgd1_1.8.4-17.woody2_sparc.deb
stable/main/binary-sparc/libgd-noxpm-dev_1.8.4-17.woody2_sparc.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-s390/libgd1-noxpm_1.8.4-17.woody2_s390.deb
stable/main/binary-s390/libgd1_1.8.4-17.woody2_s390.deb
stable/main/binary-s390/libgd-noxpm-dev_1.8.4-17.woody2_s390.deb
stable/main/binary-s390/libgd-dev_1.8.4-17.woody2_s390.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-powerpc/libgd1_1.8.4-17.woody2_powerpc.deb
stable/main/binary-powerpc/libgd-dev_1.8.4-17.woody2_powerpc.deb
stable/main/binary-powerpc/libgd1-noxpm_1.8.4-17.woody2_powerpc.deb
stable/main/binary-powerpc/libgd-noxpm-dev_1.8.4-17.woody2_powerpc.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-mipsel/libgd1-noxpm_1.8.4-17.woody2_mipsel.deb
stable/main/binary-mipsel/libgd1_1.8.4-17.woody2_mipsel.deb
stable/main/binary-mipsel/libgd-noxpm-dev_1.8.4-17.woody2_mipsel.deb
stable/main/binary-mipsel/libgd-dev_1.8.4-17.woody2_mipsel.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-mips/libgd-noxpm-dev_1.8.4-17.woody2_mips.deb
stable/main/binary-mips/libgd1_1.8.4-17.woody2_mips.deb
stable/main/binary-mips/libgd1-noxpm_1.8.4-17.woody2_mips.deb
stable/main/binary-mips/libgd-dev_1.8.4-17.woody2_mips.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-m68k/libgd1_1.8.4-17.woody2_m68k.deb
stable/main/binary-m68k/libgd-noxpm-dev_1.8.4-17.woody2_m68k.deb
stable/main/binary-m68k/libgd-dev_1.8.4-17.woody2_m68k.deb
stable/main/binary-m68k/libgd1-noxpm_1.8.4-17.woody2_m68k.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-ia64/libgd-noxpm-dev_1.8.4-17.woody2_ia64.deb
stable/main/binary-ia64/libgd1_1.8.4-17.woody2_ia64.deb
stable/main/binary-ia64/libgd-dev_1.8.4-17.woody2_ia64.deb
stable/main/binary-ia64/libgd1-noxpm_1.8.4-17.woody2_ia64.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-hppa/libgd1_1.8.4-17.woody2_hppa.deb
stable/main/binary-hppa/libgd-noxpm-dev_1.8.4-17.woody2_hppa.deb
stable/main/binary-hppa/libgd-dev_1.8.4-17.woody2_hppa.deb
stable/main/binary-hppa/libgd1-noxpm_1.8.4-17.woody2_hppa.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-arm/libgd1-noxpm_1.8.4-17.woody2_arm.deb
stable/main/binary-arm/libgd1_1.8.4-17.woody2_arm.deb
stable/main/binary-arm/libgd-dev_1.8.4-17.woody2_arm.deb
stable/main/binary-arm/libgd-noxpm-dev_1.8.4-17.woody2_arm.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-alpha/libgd1_1.8.4-17.woody2_alpha.deb
stable/main/binary-alpha/libgd-noxpm-dev_1.8.4-17.woody2_alpha.deb
stable/main/binary-alpha/libgd1-noxpm_1.8.4-17.woody2_alpha.deb
stable/main/binary-alpha/libgd-dev_1.8.4-17.woody2_alpha.deb
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-i386/libgd-dev_1.8.4-17.woody2_i386.deb
stable/main/source/libgd_1.8.4-17.woody2.dsc
stable/main/binary-i386/libgd1_1.8.4-17.woody2_i386.deb
stable/main/binary-i386/libgd-noxpm-dev_1.8.4-17.woody2_i386.deb
stable/main/binary-i386/libgd1-noxpm_1.8.4-17.woody2_i386.deb
stable/main/source/libgd_1.8.4-17.woody2.diff.gz
libgd (1.8.4-17.woody2) stable; urgency=low
  * Rebuild on woody (closes: bug#160739).


stable/main/binary-sparc/l2tpd_0.67-1.1_sparc.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-s390/l2tpd_0.67-1.1_s390.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-powerpc/l2tpd_0.67-1.1_powerpc.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-mipsel/l2tpd_0.67-1.1_mipsel.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-mips/l2tpd_0.67-1.1_mips.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-ia64/l2tpd_0.67-1.1_ia64.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-i386/l2tpd_0.67-1.1_i386.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-hppa/l2tpd_0.67-1.1_hppa.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-arm/l2tpd_0.67-1.1_arm.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-alpha/l2tpd_0.67-1.1_alpha.deb
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/source/l2tpd_0.67-1.1.dsc
stable/main/binary-m68k/l2tpd_0.67-1.1_m68k.deb
stable/main/source/l2tpd_0.67-1.1.diff.gz
l2tpd (0.67-1.1) stable-security; urgency=high
  * Seed rand() with time() at program startup
  * Fix some off by 6 errors in avp handling (included from 0.68)


stable/main/binary-sparc/krb5-rsh-server_1.2.4-5woody3_sparc.deb
stable/main/binary-sparc/libkrb53_1.2.4-5woody3_sparc.deb
stable/main/binary-sparc/krb5-telnetd_1.2.4-5woody3_sparc.deb
stable/main/binary-sparc/krb5-user_1.2.4-5woody3_sparc.deb
stable/main/binary-sparc/krb5-admin-server_1.2.4-5woody3_sparc.deb
stable/main/binary-sparc/libkrb5-dev_1.2.4-5woody3_sparc.deb
stable/main/binary-sparc/krb5-kdc_1.2.4-5woody3_sparc.deb
stable/main/binary-sparc/krb5-ftpd_1.2.4-5woody3_sparc.deb
stable/main/binary-sparc/krb5-clients_1.2.4-5woody3_sparc.deb
stable/main/binary-sparc/libkadm55_1.2.4-5woody3_sparc.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-s390/libkrb5-dev_1.2.4-5woody3_s390.deb
stable/main/binary-s390/libkadm55_1.2.4-5woody3_s390.deb
stable/main/binary-s390/krb5-ftpd_1.2.4-5woody3_s390.deb
stable/main/binary-s390/libkrb53_1.2.4-5woody3_s390.deb
stable/main/binary-s390/krb5-rsh-server_1.2.4-5woody3_s390.deb
stable/main/binary-s390/krb5-user_1.2.4-5woody3_s390.deb
stable/main/binary-s390/krb5-admin-server_1.2.4-5woody3_s390.deb
stable/main/binary-s390/krb5-telnetd_1.2.4-5woody3_s390.deb
stable/main/binary-s390/krb5-kdc_1.2.4-5woody3_s390.deb
stable/main/binary-s390/krb5-clients_1.2.4-5woody3_s390.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-powerpc/krb5-ftpd_1.2.4-5woody3_powerpc.deb
stable/main/binary-powerpc/krb5-telnetd_1.2.4-5woody3_powerpc.deb
stable/main/binary-powerpc/libkrb5-dev_1.2.4-5woody3_powerpc.deb
stable/main/binary-powerpc/krb5-user_1.2.4-5woody3_powerpc.deb
stable/main/binary-powerpc/krb5-kdc_1.2.4-5woody3_powerpc.deb
stable/main/binary-powerpc/krb5-admin-server_1.2.4-5woody3_powerpc.deb
stable/main/binary-powerpc/libkrb53_1.2.4-5woody3_powerpc.deb
stable/main/binary-powerpc/krb5-clients_1.2.4-5woody3_powerpc.deb
stable/main/binary-powerpc/krb5-rsh-server_1.2.4-5woody3_powerpc.deb
stable/main/binary-powerpc/libkadm55_1.2.4-5woody3_powerpc.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-mipsel/libkadm55_1.2.4-5woody3_mipsel.deb
stable/main/binary-mipsel/krb5-rsh-server_1.2.4-5woody3_mipsel.deb
stable/main/binary-mipsel/krb5-kdc_1.2.4-5woody3_mipsel.deb
stable/main/binary-mipsel/libkrb5-dev_1.2.4-5woody3_mipsel.deb
stable/main/binary-mipsel/krb5-admin-server_1.2.4-5woody3_mipsel.deb
stable/main/binary-mipsel/krb5-clients_1.2.4-5woody3_mipsel.deb
stable/main/binary-mipsel/libkrb53_1.2.4-5woody3_mipsel.deb
stable/main/binary-mipsel/krb5-telnetd_1.2.4-5woody3_mipsel.deb
stable/main/binary-mipsel/krb5-user_1.2.4-5woody3_mipsel.deb
stable/main/binary-mipsel/krb5-ftpd_1.2.4-5woody3_mipsel.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-mips/libkrb53_1.2.4-5woody3_mips.deb
stable/main/binary-mips/libkadm55_1.2.4-5woody3_mips.deb
stable/main/binary-mips/krb5-rsh-server_1.2.4-5woody3_mips.deb
stable/main/binary-mips/krb5-user_1.2.4-5woody3_mips.deb
stable/main/binary-mips/krb5-telnetd_1.2.4-5woody3_mips.deb
stable/main/binary-mips/krb5-admin-server_1.2.4-5woody3_mips.deb
stable/main/binary-mips/krb5-kdc_1.2.4-5woody3_mips.deb
stable/main/binary-mips/libkrb5-dev_1.2.4-5woody3_mips.deb
stable/main/binary-mips/krb5-clients_1.2.4-5woody3_mips.deb
stable/main/binary-mips/krb5-ftpd_1.2.4-5woody3_mips.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-m68k/krb5-user_1.2.4-5woody3_m68k.deb
stable/main/binary-m68k/krb5-telnetd_1.2.4-5woody3_m68k.deb
stable/main/binary-m68k/krb5-kdc_1.2.4-5woody3_m68k.deb
stable/main/binary-m68k/krb5-ftpd_1.2.4-5woody3_m68k.deb
stable/main/binary-m68k/krb5-admin-server_1.2.4-5woody3_m68k.deb
stable/main/binary-m68k/libkadm55_1.2.4-5woody3_m68k.deb
stable/main/binary-m68k/libkrb53_1.2.4-5woody3_m68k.deb
stable/main/binary-m68k/krb5-rsh-server_1.2.4-5woody3_m68k.deb
stable/main/binary-m68k/krb5-clients_1.2.4-5woody3_m68k.deb
stable/main/binary-m68k/libkrb5-dev_1.2.4-5woody3_m68k.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-ia64/libkadm55_1.2.4-5woody3_ia64.deb
stable/main/binary-ia64/libkrb5-dev_1.2.4-5woody3_ia64.deb
stable/main/binary-ia64/krb5-user_1.2.4-5woody3_ia64.deb
stable/main/binary-ia64/krb5-ftpd_1.2.4-5woody3_ia64.deb
stable/main/binary-ia64/krb5-clients_1.2.4-5woody3_ia64.deb
stable/main/binary-ia64/krb5-admin-server_1.2.4-5woody3_ia64.deb
stable/main/binary-ia64/libkrb53_1.2.4-5woody3_ia64.deb
stable/main/binary-ia64/krb5-kdc_1.2.4-5woody3_ia64.deb
stable/main/binary-ia64/krb5-rsh-server_1.2.4-5woody3_ia64.deb
stable/main/binary-ia64/krb5-telnetd_1.2.4-5woody3_ia64.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-hppa/libkrb53_1.2.4-5woody3_hppa.deb
stable/main/binary-hppa/krb5-clients_1.2.4-5woody3_hppa.deb
stable/main/binary-hppa/krb5-ftpd_1.2.4-5woody3_hppa.deb
stable/main/binary-hppa/krb5-admin-server_1.2.4-5woody3_hppa.deb
stable/main/binary-hppa/libkadm55_1.2.4-5woody3_hppa.deb
stable/main/binary-hppa/krb5-telnetd_1.2.4-5woody3_hppa.deb
stable/main/binary-hppa/krb5-user_1.2.4-5woody3_hppa.deb
stable/main/binary-hppa/libkrb5-dev_1.2.4-5woody3_hppa.deb
stable/main/binary-hppa/krb5-kdc_1.2.4-5woody3_hppa.deb
stable/main/binary-hppa/krb5-rsh-server_1.2.4-5woody3_hppa.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-arm/krb5-telnetd_1.2.4-5woody3_arm.deb
stable/main/binary-arm/libkadm55_1.2.4-5woody3_arm.deb
stable/main/binary-arm/krb5-user_1.2.4-5woody3_arm.deb
stable/main/binary-arm/krb5-ftpd_1.2.4-5woody3_arm.deb
stable/main/binary-arm/krb5-kdc_1.2.4-5woody3_arm.deb
stable/main/binary-arm/krb5-admin-server_1.2.4-5woody3_arm.deb
stable/main/binary-arm/libkrb5-dev_1.2.4-5woody3_arm.deb
stable/main/binary-arm/krb5-clients_1.2.4-5woody3_arm.deb
stable/main/binary-arm/krb5-rsh-server_1.2.4-5woody3_arm.deb
stable/main/binary-arm/libkrb53_1.2.4-5woody3_arm.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-alpha/krb5-rsh-server_1.2.4-5woody3_alpha.deb
stable/main/binary-alpha/krb5-telnetd_1.2.4-5woody3_alpha.deb
stable/main/binary-alpha/libkadm55_1.2.4-5woody3_alpha.deb
stable/main/binary-alpha/krb5-kdc_1.2.4-5woody3_alpha.deb
stable/main/binary-alpha/krb5-ftpd_1.2.4-5woody3_alpha.deb
stable/main/binary-alpha/krb5-admin-server_1.2.4-5woody3_alpha.deb
stable/main/binary-alpha/libkrb5-dev_1.2.4-5woody3_alpha.deb
stable/main/binary-alpha/krb5-user_1.2.4-5woody3_alpha.deb
stable/main/binary-alpha/krb5-clients_1.2.4-5woody3_alpha.deb
stable/main/binary-alpha/libkrb53_1.2.4-5woody3_alpha.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/binary-i386/krb5-clients_1.2.4-5woody3_i386.deb
stable/main/binary-i386/krb5-admin-server_1.2.4-5woody3_i386.deb
stable/main/binary-all/krb5-doc_1.2.4-5woody3_all.deb
stable/main/source/krb5_1.2.4-5woody3.dsc
stable/main/binary-i386/krb5-ftpd_1.2.4-5woody3_i386.deb
stable/main/binary-i386/libkrb5-dev_1.2.4-5woody3_i386.deb
stable/main/binary-i386/libkrb53_1.2.4-5woody3_i386.deb
stable/main/binary-i386/krb5-rsh-server_1.2.4-5woody3_i386.deb
stable/main/source/krb5_1.2.4-5woody3.diff.gz
stable/main/binary-i386/krb5-telnetd_1.2.4-5woody3_i386.deb
stable/main/binary-i386/krb5-user_1.2.4-5woody3_i386.deb
stable/main/binary-i386/krb5-kdc_1.2.4-5woody3_i386.deb
stable/main/binary-i386/libkadm55_1.2.4-5woody3_i386.deb
krb5 (1.2.4-5woody3) stable-security; urgency=high
  * Fix remote root vulnerability in the v4 kadmind (kadmind4); buffer
    overflow in network packet handling..  Fortunately
    this daemon is not run by default  in the Debian packages but it is
    provided.


stable/main/source/kernel-source-2.2.22_2.2.22-1.diff.gz
stable/main/source/kernel-source-2.2.22_2.2.22.orig.tar.gz
stable/main/binary-all/kernel-source-2.2.22_2.2.22-1_all.deb
stable/main/binary-all/kernel-doc-2.2.22_2.2.22-1_all.deb
stable/main/source/kernel-source-2.2.22_2.2.22-1.dsc
kernel-source-2.2.22 (2.2.22-1) stable unstable; urgency=low
  * New upstream release.
  * Disabled MCE on Pentiums by default (closes: #154589).


stable/main/binary-mips/mips-tools_2.4.19-0.020911.1.woody0_mips.deb
stable/main/binary-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody0_mips.deb
stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody0.dsc
stable/main/binary-all/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody0_all.deb
stable/main/binary-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody0_mips.deb
stable/main/source/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody0.tar.gz
stable/main/binary-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody0_mips.deb
kernel-patch-2.4.19-mips (2.4.19-0.020911.1.woody0) stable; urgency=low
  * actually 2.4.19-0.020911.2 recompiled for woody (rediffed against
    kernel-source-2.4.19-4)


stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.diff.gz
stable/main/binary-all/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1_all.deb
stable/main/source/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.1.dsc
kernel-patch-2.4.17-s390 (0.0.20020816-0.woody.1) stable; urgency=high
  * Integrated a new kernel-patch from the IBM Developerworks
    website (released on 2002.06.12).
    This patch fixes the DASD deadlock problem and some other severe
    problems.
  * Removed NMU DASD deadlock fix.
  * Integrated a new kernel-patch from the IBM Developerworks
    website (released on 2002.08.16).
    This patch fixes a problem related to the IUCV driver.


stable/main/binary-all/kernel-headers-2.4.19-sparc_26_all.deb
stable/main/source/kernel-image-sparc-2.4_26.tar.gz
stable/main/binary-sparc/kernel-image-2.4.19-sun4u_26_sparc.deb
stable/main/source/kernel-image-sparc-2.4_26.dsc
stable/main/binary-sparc/kernel-image-2.4.19-sun4u-smp_26_sparc.deb
kernel-image-sparc-2.4 (26) stable; urgency=low
  * More patches from davem, to fix serious bugs.
  * Strip kernel image so it fits better (makes SILO and TILO happy)


stable/main/binary-s390/kernel-headers-2.4.17_2.4.17-2.woody.1.1_s390.deb
stable/main/binary-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.1.1_s390.deb
stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.1.1.dsc
stable/main/source/kernel-image-2.4.17-s390_2.4.17-2.woody.1.1.tar.gz
kernel-image-2.4.17-s390 (2.4.17-2.woody.1.1) stable; urgency=high
  * NMU
  * Integrated a new kernel-patch from the IBM Developerworks
    website (released on 2002.06.12).
    This patch fixes the DASD deadlock problem and some other severe
    problems.
  * Removed NMU DASD deadlock fix.
  * Integrated a new kernel-patch from the IBM Developerworks
    website (released on 2002.08.16).
    This patch fixes a problem related to the IUCV driver.


stable/main/binary-alpha/kernel-image-2.2.22-generic_2.2.22-1_alpha.deb
stable/main/binary-alpha/kernel-image-2.2.22-jensen_2.2.22-1_alpha.deb
stable/main/source/kernel-image-2.2.22-alpha_2.2.22-1.dsc
stable/main/binary-alpha/kernel-image-2.2.22-smp_2.2.22-1_alpha.deb
stable/main/source/kernel-image-2.2.22-alpha_2.2.22-1.tar.gz
stable/main/binary-alpha/kernel-headers-2.2.22_2.2.22-1_alpha.deb
stable/main/binary-alpha/kernel-image-2.2.22-nautilus_2.2.22-1_alpha.deb
kernel-image-2.2.22-alpha (2.2.22-1) stable unstable; urgency=low
  * New upstream release.


stable/main/binary-sparc/kdelibs3-cups_2.2.2-13.woody.5_sparc.deb
stable/main/binary-sparc/libarts_2.2.2-13.woody.5_sparc.deb
stable/main/binary-sparc/libkmid-dev_2.2.2-13.woody.5_sparc.deb
stable/main/binary-sparc/kdelibs3_2.2.2-13.woody.5_sparc.deb
stable/main/binary-sparc/libkmid_2.2.2-13.woody.5_sparc.deb
stable/main/binary-sparc/libarts-alsa_2.2.2-13.woody.5_sparc.deb
stable/main/binary-sparc/kdelibs-dev_2.2.2-13.woody.5_sparc.deb
stable/main/binary-sparc/libkmid-alsa_2.2.2-13.woody.5_sparc.deb
stable/main/binary-sparc/libarts-dev_2.2.2-13.woody.5_sparc.deb
stable/main/binary-sparc/kdelibs3-bin_2.2.2-13.woody.5_sparc.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-s390/libarts_2.2.2-13.woody.5_s390.deb
stable/main/binary-s390/kdelibs-dev_2.2.2-13.woody.5_s390.deb
stable/main/binary-s390/libkmid_2.2.2-13.woody.5_s390.deb
stable/main/binary-s390/kdelibs3_2.2.2-13.woody.5_s390.deb
stable/main/binary-s390/libkmid-dev_2.2.2-13.woody.5_s390.deb
stable/main/binary-s390/kdelibs3-cups_2.2.2-13.woody.5_s390.deb
stable/main/binary-s390/libarts-alsa_2.2.2-13.woody.5_s390.deb
stable/main/binary-s390/libarts-dev_2.2.2-13.woody.5_s390.deb
stable/main/binary-s390/kdelibs3-bin_2.2.2-13.woody.5_s390.deb
stable/main/binary-s390/libkmid-alsa_2.2.2-13.woody.5_s390.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-powerpc/libkmid-dev_2.2.2-13.woody.5_powerpc.deb
stable/main/binary-powerpc/kdelibs3_2.2.2-13.woody.5_powerpc.deb
stable/main/binary-powerpc/libarts-alsa_2.2.2-13.woody.5_powerpc.deb
stable/main/binary-powerpc/libarts_2.2.2-13.woody.5_powerpc.deb
stable/main/binary-powerpc/kdelibs3-cups_2.2.2-13.woody.5_powerpc.deb
stable/main/binary-powerpc/kdelibs3-bin_2.2.2-13.woody.5_powerpc.deb
stable/main/binary-powerpc/libarts-dev_2.2.2-13.woody.5_powerpc.deb
stable/main/binary-powerpc/kdelibs-dev_2.2.2-13.woody.5_powerpc.deb
stable/main/binary-powerpc/libkmid-alsa_2.2.2-13.woody.5_powerpc.deb
stable/main/binary-powerpc/libkmid_2.2.2-13.woody.5_powerpc.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-mips/libkmid-dev_2.2.2-13.woody.5_mips.deb
stable/main/binary-mips/kdelibs3_2.2.2-13.woody.5_mips.deb
stable/main/binary-mips/libkmid_2.2.2-13.woody.5_mips.deb
stable/main/binary-mips/libarts-alsa_2.2.2-13.woody.5_mips.deb
stable/main/binary-mips/libarts-dev_2.2.2-13.woody.5_mips.deb
stable/main/binary-mips/kdelibs3-bin_2.2.2-13.woody.5_mips.deb
stable/main/binary-mips/kdelibs3-cups_2.2.2-13.woody.5_mips.deb
stable/main/binary-mips/libarts_2.2.2-13.woody.5_mips.deb
stable/main/binary-mips/kdelibs-dev_2.2.2-13.woody.5_mips.deb
stable/main/binary-mips/libkmid-alsa_2.2.2-13.woody.5_mips.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-m68k/libkmid_2.2.2-13.woody.5_m68k.deb
stable/main/binary-m68k/kdelibs3_2.2.2-13.woody.5_m68k.deb
stable/main/binary-m68k/libkmid-dev_2.2.2-13.woody.5_m68k.deb
stable/main/binary-m68k/libkmid-alsa_2.2.2-13.woody.5_m68k.deb
stable/main/binary-m68k/kdelibs3-bin_2.2.2-13.woody.5_m68k.deb
stable/main/binary-m68k/libarts-dev_2.2.2-13.woody.5_m68k.deb
stable/main/binary-m68k/kdelibs3-cups_2.2.2-13.woody.5_m68k.deb
stable/main/binary-m68k/kdelibs-dev_2.2.2-13.woody.5_m68k.deb
stable/main/binary-m68k/libarts_2.2.2-13.woody.5_m68k.deb
stable/main/binary-m68k/libarts-alsa_2.2.2-13.woody.5_m68k.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-ia64/kdelibs3-bin_2.2.2-13.woody.5_ia64.deb
stable/main/binary-ia64/libarts_2.2.2-13.woody.5_ia64.deb
stable/main/binary-ia64/libkmid_2.2.2-13.woody.5_ia64.deb
stable/main/binary-ia64/kdelibs-dev_2.2.2-13.woody.5_ia64.deb
stable/main/binary-ia64/libkmid-alsa_2.2.2-13.woody.5_ia64.deb
stable/main/binary-ia64/libarts-alsa_2.2.2-13.woody.5_ia64.deb
stable/main/binary-ia64/kdelibs3_2.2.2-13.woody.5_ia64.deb
stable/main/binary-ia64/libkmid-dev_2.2.2-13.woody.5_ia64.deb
stable/main/binary-ia64/kdelibs3-cups_2.2.2-13.woody.5_ia64.deb
stable/main/binary-ia64/libarts-dev_2.2.2-13.woody.5_ia64.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-i386/libarts_2.2.2-13.woody.5_i386.deb
stable/main/binary-i386/libkmid-alsa_2.2.2-13.woody.5_i386.deb
stable/main/binary-i386/libarts-alsa_2.2.2-13.woody.5_i386.deb
stable/main/binary-i386/kdelibs-dev_2.2.2-13.woody.5_i386.deb
stable/main/binary-i386/libkmid-dev_2.2.2-13.woody.5_i386.deb
stable/main/binary-i386/kdelibs3-cups_2.2.2-13.woody.5_i386.deb
stable/main/binary-i386/kdelibs3_2.2.2-13.woody.5_i386.deb
stable/main/binary-i386/libarts-dev_2.2.2-13.woody.5_i386.deb
stable/main/binary-i386/kdelibs3-bin_2.2.2-13.woody.5_i386.deb
stable/main/binary-i386/libkmid_2.2.2-13.woody.5_i386.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-hppa/kdelibs3-bin_2.2.2-13.woody.5_hppa.deb
stable/main/binary-hppa/libarts_2.2.2-13.woody.5_hppa.deb
stable/main/binary-hppa/libkmid-dev_2.2.2-13.woody.5_hppa.deb
stable/main/binary-hppa/libarts-dev_2.2.2-13.woody.5_hppa.deb
stable/main/binary-hppa/kdelibs3_2.2.2-13.woody.5_hppa.deb
stable/main/binary-hppa/kdelibs3-cups_2.2.2-13.woody.5_hppa.deb
stable/main/binary-hppa/libarts-alsa_2.2.2-13.woody.5_hppa.deb
stable/main/binary-hppa/libkmid_2.2.2-13.woody.5_hppa.deb
stable/main/binary-hppa/libkmid-alsa_2.2.2-13.woody.5_hppa.deb
stable/main/binary-hppa/kdelibs-dev_2.2.2-13.woody.5_hppa.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-arm/libarts-alsa_2.2.2-13.woody.5_arm.deb
stable/main/binary-arm/libkmid-alsa_2.2.2-13.woody.5_arm.deb
stable/main/binary-arm/kdelibs3-bin_2.2.2-13.woody.5_arm.deb
stable/main/binary-arm/libarts-dev_2.2.2-13.woody.5_arm.deb
stable/main/binary-arm/kdelibs3-cups_2.2.2-13.woody.5_arm.deb
stable/main/binary-arm/kdelibs3_2.2.2-13.woody.5_arm.deb
stable/main/binary-arm/libarts_2.2.2-13.woody.5_arm.deb
stable/main/binary-arm/kdelibs-dev_2.2.2-13.woody.5_arm.deb
stable/main/binary-arm/libkmid-dev_2.2.2-13.woody.5_arm.deb
stable/main/binary-arm/libkmid_2.2.2-13.woody.5_arm.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-alpha/libarts-alsa_2.2.2-13.woody.5_alpha.deb
stable/main/binary-alpha/kdelibs3-cups_2.2.2-13.woody.5_alpha.deb
stable/main/binary-alpha/kdelibs-dev_2.2.2-13.woody.5_alpha.deb
stable/main/binary-alpha/libkmid_2.2.2-13.woody.5_alpha.deb
stable/main/binary-alpha/kdelibs3_2.2.2-13.woody.5_alpha.deb
stable/main/binary-alpha/libkmid-dev_2.2.2-13.woody.5_alpha.deb
stable/main/binary-alpha/libarts_2.2.2-13.woody.5_alpha.deb
stable/main/binary-alpha/kdelibs3-bin_2.2.2-13.woody.5_alpha.deb
stable/main/binary-alpha/libarts-dev_2.2.2-13.woody.5_alpha.deb
stable/main/binary-alpha/libkmid-alsa_2.2.2-13.woody.5_alpha.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/source/kdelibs_2.2.2-13.woody.5.diff.gz
stable/main/binary-mipsel/libkmid-dev_2.2.2-13.woody.5_mipsel.deb
stable/main/binary-mipsel/libkmid-alsa_2.2.2-13.woody.5_mipsel.deb
stable/main/binary-mipsel/kdelibs3_2.2.2-13.woody.5_mipsel.deb
stable/main/source/kdelibs_2.2.2-13.woody.5.dsc
stable/main/binary-mipsel/kdelibs-dev_2.2.2-13.woody.5_mipsel.deb
stable/main/binary-mipsel/kdelibs3-bin_2.2.2-13.woody.5_mipsel.deb
stable/main/binary-all/kdelibs3-doc_2.2.2-13.woody.5_all.deb
stable/main/binary-mipsel/kdelibs3-cups_2.2.2-13.woody.5_mipsel.deb
stable/main/binary-mipsel/libarts-dev_2.2.2-13.woody.5_mipsel.deb
stable/main/binary-mipsel/libarts-alsa_2.2.2-13.woody.5_mipsel.deb
stable/main/binary-mipsel/libarts_2.2.2-13.woody.5_mipsel.deb
stable/main/binary-mipsel/libkmid_2.2.2-13.woody.5_mipsel.deb
kdelibs (4:2.2.2-13.woody.5) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Second (or third, since the first one burnt together with satie and
    the entire building around it) injection into the security build
    network since 8 buildds refuse to upload the binary packages and the
    maintainer refuses to answer.  *sigh*


stable/main/binary-s390/kamera_2.2.2-6.8_s390.deb
stable/main/binary-s390/kcoloredit_2.2.2-6.8_s390.deb
stable/main/binary-s390/libkscan-dev_2.2.2-6.8_s390.deb
stable/main/binary-s390/kruler_2.2.2-6.8_s390.deb
stable/main/binary-s390/kghostview_2.2.2-6.8_s390.deb
stable/main/binary-s390/kpaint_2.2.2-6.8_s390.deb
stable/main/binary-s390/kooka_2.2.2-6.8_s390.deb
stable/main/binary-s390/libkscan1_2.2.2-6.8_s390.deb
stable/main/binary-s390/ksnapshot_2.2.2-6.8_s390.deb
stable/main/binary-s390/kiconedit_2.2.2-6.8_s390.deb
stable/main/binary-s390/kfract_2.2.2-6.8_s390.deb
stable/main/binary-s390/kview_2.2.2-6.8_s390.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-powerpc/kruler_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/libkscan1_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/kamera_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/kiconedit_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/kghostview_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/ksnapshot_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/libkscan-dev_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/kpaint_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/kview_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/kfract_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/kcoloredit_2.2.2-6.8_powerpc.deb
stable/main/binary-powerpc/kooka_2.2.2-6.8_powerpc.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-mipsel/kamera_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/kfract_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/kiconedit_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/kruler_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/libkscan1_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/kcoloredit_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/kooka_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/kpaint_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/kghostview_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/ksnapshot_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/kview_2.2.2-6.8_mipsel.deb
stable/main/binary-mipsel/libkscan-dev_2.2.2-6.8_mipsel.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    M|ller of KDE.


stable/main/binary-mips/kamera_2.2.2-6.8_mips.deb
stable/main/binary-mips/libkscan-dev_2.2.2-6.8_mips.deb
stable/main/binary-mips/kghostview_2.2.2-6.8_mips.deb
stable/main/binary-mips/kcoloredit_2.2.2-6.8_mips.deb
stable/main/binary-mips/kpaint_2.2.2-6.8_mips.deb
stable/main/binary-mips/kooka_2.2.2-6.8_mips.deb
stable/main/binary-mips/ksnapshot_2.2.2-6.8_mips.deb
stable/main/binary-mips/kfract_2.2.2-6.8_mips.deb
stable/main/binary-mips/kiconedit_2.2.2-6.8_mips.deb
stable/main/binary-mips/kruler_2.2.2-6.8_mips.deb
stable/main/binary-mips/libkscan1_2.2.2-6.8_mips.deb
stable/main/binary-mips/kview_2.2.2-6.8_mips.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-m68k/kcoloredit_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/kview_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/kamera_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/libkscan-dev_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/kghostview_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/kruler_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/kfract_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/ksnapshot_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/libkscan1_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/kooka_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/kpaint_2.2.2-6.8_m68k.deb
stable/main/binary-m68k/kiconedit_2.2.2-6.8_m68k.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-ia64/kooka_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/kpaint_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/kcoloredit_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/kiconedit_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/libkscan-dev_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/kghostview_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/kamera_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/libkscan1_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/kruler_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/ksnapshot_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/kview_2.2.2-6.8_ia64.deb
stable/main/binary-ia64/kfract_2.2.2-6.8_ia64.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-i386/kiconedit_2.2.2-6.8_i386.deb
stable/main/binary-i386/kfract_2.2.2-6.8_i386.deb
stable/main/binary-i386/libkscan1_2.2.2-6.8_i386.deb
stable/main/binary-i386/kooka_2.2.2-6.8_i386.deb
stable/main/binary-i386/kpaint_2.2.2-6.8_i386.deb
stable/main/binary-i386/kghostview_2.2.2-6.8_i386.deb
stable/main/binary-i386/libkscan-dev_2.2.2-6.8_i386.deb
stable/main/binary-i386/ksnapshot_2.2.2-6.8_i386.deb
stable/main/binary-i386/kruler_2.2.2-6.8_i386.deb
stable/main/binary-i386/kcoloredit_2.2.2-6.8_i386.deb
stable/main/binary-i386/kview_2.2.2-6.8_i386.deb
stable/main/binary-i386/kamera_2.2.2-6.8_i386.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-hppa/kfract_2.2.2-6.8_hppa.deb
stable/main/binary-hppa/kamera_2.2.2-6.8_hppa.deb
stable/main/binary-hppa/kcoloredit_2.2.2-6.8_hppa.deb
stable/main/binary-hppa/kpaint_2.2.2-6.8_hppa.deb
stable/main/binary-hppa/ksnapshot_2.2.2-6.8_hppa.deb
stable/main/binary-hppa/kghostview_2.2.2-6.8_hppa.deb
stable/main/binary-hppa/kview_2.2.2-6.8_hppa.deb
stable/main/binary-hppa/kruler_2.2.2-6.8_hppa.deb
stable/main/binary-hppa/kiconedit_2.2.2-6.8_hppa.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-arm/kooka_2.2.2-6.8_arm.deb
stable/main/binary-arm/libkscan1_2.2.2-6.8_arm.deb
stable/main/binary-arm/ksnapshot_2.2.2-6.8_arm.deb
stable/main/binary-arm/kpaint_2.2.2-6.8_arm.deb
stable/main/binary-arm/kghostview_2.2.2-6.8_arm.deb
stable/main/binary-arm/kcoloredit_2.2.2-6.8_arm.deb
stable/main/binary-arm/kiconedit_2.2.2-6.8_arm.deb
stable/main/binary-arm/kruler_2.2.2-6.8_arm.deb
stable/main/binary-arm/libkscan-dev_2.2.2-6.8_arm.deb
stable/main/binary-arm/kfract_2.2.2-6.8_arm.deb
stable/main/binary-arm/kview_2.2.2-6.8_arm.deb
stable/main/binary-arm/kamera_2.2.2-6.8_arm.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-alpha/kview_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/kamera_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/kghostview_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/kruler_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/kiconedit_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/kooka_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/kpaint_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/ksnapshot_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/libkscan-dev_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/kcoloredit_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/libkscan1_2.2.2-6.8_alpha.deb
stable/main/binary-alpha/kfract_2.2.2-6.8_alpha.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-sparc/libkscan-dev_2.2.2-6.8_sparc.deb
stable/main/binary-sparc/kfract_2.2.2-6.8_sparc.deb
stable/main/binary-sparc/kview_2.2.2-6.8_sparc.deb
stable/main/binary-sparc/kiconedit_2.2.2-6.8_sparc.deb
stable/main/binary-sparc/ksnapshot_2.2.2-6.8_sparc.deb
stable/main/binary-sparc/kamera_2.2.2-6.8_sparc.deb
stable/main/source/kdegraphics_2.2.2-6.8.dsc
stable/main/binary-sparc/kcoloredit_2.2.2-6.8_sparc.deb
stable/main/binary-sparc/kruler_2.2.2-6.8_sparc.deb
stable/main/source/kdegraphics_2.2.2-6.8.diff.gz
stable/main/binary-sparc/kghostview_2.2.2-6.8_sparc.deb
stable/main/binary-sparc/kpaint_2.2.2-6.8_sparc.deb
stable/main/binary-sparc/kooka_2.2.2-6.8_sparc.deb
stable/main/binary-sparc/libkscan1_2.2.2-6.8_sparc.deb
kdegraphics (4:2.2.2-6.8) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Looks like I missed one more occurrence of sscanf().  Thanks to Dirk
    Müller of KDE.


stable/main/binary-s390/irssi-text_0.8.4-3.1_s390.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-powerpc/irssi-text_0.8.4-3.1_powerpc.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-mipsel/irssi-text_0.8.4-3.1_mipsel.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-mips/irssi-text_0.8.4-3.1_mips.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-m68k/irssi-text_0.8.4-3.1_m68k.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-ia64/irssi-text_0.8.4-3.1_ia64.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-i386/irssi-text_0.8.4-3.1_i386.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-hppa/irssi-text_0.8.4-3.1_hppa.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-arm/irssi-text_0.8.4-3.1_arm.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-alpha/irssi-text_0.8.4-3.1_alpha.deb
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/source/irssi-text_0.8.4-3.1.diff.gz
stable/main/binary-sparc/irssi-text_0.8.4-3.1_sparc.deb
stable/main/source/irssi-text_0.8.4-3.1.dsc
irssi-text (0.8.4-3.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to keep irssi from crashing on maliciously
    crafted topics


stable/main/binary-sparc/interchange_4.8.3.20020306-1.woody.1_sparc.deb
stable/main/binary-sparc/libapache-mod-interchange_4.8.3.20020306-1.woody.1_sparc.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-s390/libapache-mod-interchange_4.8.3.20020306-1.woody.1_s390.deb
stable/main/binary-s390/interchange_4.8.3.20020306-1.woody.1_s390.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-powerpc/interchange_4.8.3.20020306-1.woody.1_powerpc.deb
stable/main/binary-powerpc/libapache-mod-interchange_4.8.3.20020306-1.woody.1_powerpc.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-mipsel/interchange_4.8.3.20020306-1.woody.1_mipsel.deb
stable/main/binary-mipsel/libapache-mod-interchange_4.8.3.20020306-1.woody.1_mipsel.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-mips/libapache-mod-interchange_4.8.3.20020306-1.woody.1_mips.deb
stable/main/binary-mips/interchange_4.8.3.20020306-1.woody.1_mips.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-m68k/interchange_4.8.3.20020306-1.woody.1_m68k.deb
stable/main/binary-m68k/libapache-mod-interchange_4.8.3.20020306-1.woody.1_m68k.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-ia64/interchange_4.8.3.20020306-1.woody.1_ia64.deb
stable/main/binary-ia64/libapache-mod-interchange_4.8.3.20020306-1.woody.1_ia64.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-hppa/libapache-mod-interchange_4.8.3.20020306-1.woody.1_hppa.deb
stable/main/binary-hppa/interchange_4.8.3.20020306-1.woody.1_hppa.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-arm/libapache-mod-interchange_4.8.3.20020306-1.woody.1_arm.deb
stable/main/binary-arm/interchange_4.8.3.20020306-1.woody.1_arm.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-alpha/libapache-mod-interchange_4.8.3.20020306-1.woody.1_alpha.deb
stable/main/binary-alpha/interchange_4.8.3.20020306-1.woody.1_alpha.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/source/interchange_4.8.3.20020306-1.woody.1.dsc
stable/main/source/interchange_4.8.3.20020306-1.woody.1.diff.gz
stable/main/binary-all/interchange-ui_4.8.3.20020306-1.woody.1_all.deb
stable/main/binary-i386/interchange_4.8.3.20020306-1.woody.1_i386.deb
stable/main/binary-all/interchange-cat-foundation_4.8.3.20020306-1.woody.1_all.deb
stable/main/binary-i386/libapache-mod-interchange_4.8.3.20020306-1.woody.1_i386.deb
interchange (4.8.3.20020306-1.woody.1) stable-security; urgency=high
  * fixed possible remote access to local files readable by the Interchange
    daemon running in INET mode.


stable/main/binary-all/initrd-tools_0.1.32woody.3_all.deb
stable/main/source/initrd-tools_0.1.32woody.3.dsc
stable/main/source/initrd-tools_0.1.32woody.3.tar.gz
initrd-tools (0.1.32woody.3) stable; urgency=low
  * Depend on debhelper >= 3 (closes: #171364).


stable/main/source/im_141-18.2.dsc
stable/main/binary-all/im_141-18.2_all.deb
stable/main/source/im_141-18.2.diff.gz
im (1:141-18.2) stable-security; urgency=medium
  * Non-maintainer upload by the Security Team
  * Fixed yafhci386 that turned out to be yafhc$build_arch


stable/main/binary-s390/hylafax-server_4.1.1-1.1_s390.deb
stable/main/binary-s390/hylafax-client_4.1.1-1.1_s390.deb
hylafax (1:4.1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Backported secrurity fixes from 4.1.3:
    . Fixed hostname format string vulnerabilities in faxrm, faxstat,
      faxalter, sendfax, sendpage, faxfetch and faxwatch
    . Fixed a potential buffer overflow when copying TIF data
    . Fixed TSI format string vulnerability in faxgetty
  * Added a double cast so g++ will actually like the last backported fix


stable/main/binary-powerpc/hylafax-server_4.1.1-1.1_powerpc.deb
stable/main/binary-powerpc/hylafax-client_4.1.1-1.1_powerpc.deb
hylafax (1:4.1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Backported secrurity fixes from 4.1.3:
    . Fixed hostname format string vulnerabilities in faxrm, faxstat,
      faxalter, sendfax, sendpage, faxfetch and faxwatch
    . Fixed a potential buffer overflow when copying TIF data
    . Fixed TSI format string vulnerability in faxgetty
  * Added a double cast so g++ will actually like the last backported fix


stable/main/binary-m68k/hylafax-client_4.1.1-1.1_m68k.deb
stable/main/binary-m68k/hylafax-server_4.1.1-1.1_m68k.deb
hylafax (1:4.1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Backported secrurity fixes from 4.1.3:
    . Fixed hostname format string vulnerabilities in faxrm, faxstat,
      faxalter, sendfax, sendpage, faxfetch and faxwatch
    . Fixed a potential buffer overflow when copying TIF data
    . Fixed TSI format string vulnerability in faxgetty
  * Added a double cast so g++ will actually like the last backported fix


stable/main/binary-ia64/hylafax-server_4.1.1-1.1_ia64.deb
stable/main/binary-ia64/hylafax-client_4.1.1-1.1_ia64.deb
hylafax (1:4.1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Backported secrurity fixes from 4.1.3:
    . Fixed hostname format string vulnerabilities in faxrm, faxstat,
      faxalter, sendfax, sendpage, faxfetch and faxwatch
    . Fixed a potential buffer overflow when copying TIF data
    . Fixed TSI format string vulnerability in faxgetty
  * Added a double cast so g++ will actually like the last backported fix


stable/main/binary-i386/hylafax-server_4.1.1-1.1_i386.deb
stable/main/binary-i386/hylafax-client_4.1.1-1.1_i386.deb
hylafax (1:4.1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Backported secrurity fixes from 4.1.3:
    . Fixed hostname format string vulnerabilities in faxrm, faxstat,
      faxalter, sendfax, sendpage, faxfetch and faxwatch
    . Fixed a potential buffer overflow when copying TIF data
    . Fixed TSI format string vulnerability in faxgetty
  * Added a double cast so g++ will actually like the last backported fix


stable/main/binary-hppa/hylafax-server_4.1.1-1.1_hppa.deb
stable/main/binary-hppa/hylafax-client_4.1.1-1.1_hppa.deb
hylafax (1:4.1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Backported secrurity fixes from 4.1.3:
    . Fixed hostname format string vulnerabilities in faxrm, faxstat,
      faxalter, sendfax, sendpage, faxfetch and faxwatch
    . Fixed a potential buffer overflow when copying TIF data
    . Fixed TSI format string vulnerability in faxgetty
  * Added a double cast so g++ will actually like the last backported fix


stable/main/binary-arm/hylafax-client_4.1.1-1.1_arm.deb
stable/main/binary-arm/hylafax-server_4.1.1-1.1_arm.deb
hylafax (1:4.1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Backported secrurity fixes from 4.1.3:
    . Fixed hostname format string vulnerabilities in faxrm, faxstat,
      faxalter, sendfax, sendpage, faxfetch and faxwatch
    . Fixed a potential buffer overflow when copying TIF data
    . Fixed TSI format string vulnerability in faxgetty
  * Added a double cast so g++ will actually like the last backported fix


stable/main/binary-alpha/hylafax-client_4.1.1-1.1_alpha.deb
stable/main/binary-alpha/hylafax-server_4.1.1-1.1_alpha.deb
hylafax (1:4.1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Backported secrurity fixes from 4.1.3:
    . Fixed hostname format string vulnerabilities in faxrm, faxstat,
      faxalter, sendfax, sendpage, faxfetch and faxwatch
    . Fixed a potential buffer overflow when copying TIF data
    . Fixed TSI format string vulnerability in faxgetty
  * Added a double cast so g++ will actually like the last backported fix


stable/main/binary-all/hylafax-doc_4.1.1-1.1_all.deb
stable/main/source/hylafax_4.1.1-1.1.diff.gz
stable/main/source/hylafax_4.1.1-1.1.dsc
stable/main/binary-sparc/hylafax-client_4.1.1-1.1_sparc.deb
stable/main/binary-sparc/hylafax-server_4.1.1-1.1_sparc.deb
hylafax (1:4.1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Backported secrurity fixes from 4.1.3:
    . Fixed hostname format string vulnerabilities in faxrm, faxstat,
      faxalter, sendfax, sendpage, faxfetch and faxwatch
    . Fixed a potential buffer overflow when copying TIF data
    . Fixed TSI format string vulnerability in faxgetty
  * Added a double cast so g++ will actually like the last backported fix


stable/main/binary-hppa/htmldoc_1.8.17-2_hppa.deb
htmldoc (1.8.17-2) woody-proposed-updates; urgency=high
  * Fixed bug in configure.in; --without-openssl-* wasn't recognized.
    Considered high priority because the previous version of htmldoc is
    linked against OpenSSL because of this bug, which is a violation of
    the GPL.


stable/main/binary-all/html2ps_1.0b3-1.2_all.deb
stable/main/source/html2ps_1.0b3-1.2.dsc
stable/main/source/html2ps_1.0b3-1.2.diff.gz
html2ps (1.0b3-1.2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Fix a trivial syntax error introduced in 1.0b3-1.1 (Closes: #170272)


stable/main/binary-s390/htcheck_1.1-1.1_s390.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-powerpc/htcheck_1.1-1.1_powerpc.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-mipsel/htcheck_1.1-1.1_mipsel.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-mips/htcheck_1.1-1.1_mips.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-m68k/htcheck_1.1-1.1_m68k.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-ia64/htcheck_1.1-1.1_ia64.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-i386/htcheck_1.1-1.1_i386.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-hppa/htcheck_1.1-1.1_hppa.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-arm/htcheck_1.1-1.1_arm.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-alpha/htcheck_1.1-1.1_alpha.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-sparc/htcheck_1.1-1.1_sparc.deb
stable/main/source/htcheck_1.1-1.1.dsc
stable/main/source/htcheck_1.1-1.1.diff.gz
stable/main/binary-all/htcheck-php_1.1-1.1_all.deb
htcheck (1:1.1-1.1) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Added get_html_entities() to return characters that need to be
    replaced in order to avoid a cross site scripting problem
  * Added implementation of WriteHTML() by weasel
  * Applied upstream patch to avoid unintended code execution through
    uninitialized variables
  * Applied upstream patch on the use of WriteHTML()


stable/main/binary-s390/libstonith0_0.4.9.0l-7.2_s390.deb
stable/main/binary-s390/libstonith-dev_0.4.9.0l-7.2_s390.deb
stable/main/binary-s390/heartbeat_0.4.9.0l-7.2_s390.deb
stable/main/binary-s390/stonith_0.4.9.0l-7.2_s390.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-powerpc/stonith_0.4.9.0l-7.2_powerpc.deb
stable/main/binary-powerpc/libstonith-dev_0.4.9.0l-7.2_powerpc.deb
stable/main/binary-powerpc/heartbeat_0.4.9.0l-7.2_powerpc.deb
stable/main/binary-powerpc/libstonith0_0.4.9.0l-7.2_powerpc.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-mipsel/libstonith-dev_0.4.9.0l-7.2_mipsel.deb
stable/main/binary-mipsel/heartbeat_0.4.9.0l-7.2_mipsel.deb
stable/main/binary-mipsel/libstonith0_0.4.9.0l-7.2_mipsel.deb
stable/main/binary-mipsel/stonith_0.4.9.0l-7.2_mipsel.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-mips/libstonith0_0.4.9.0l-7.2_mips.deb
stable/main/binary-mips/stonith_0.4.9.0l-7.2_mips.deb
stable/main/binary-mips/heartbeat_0.4.9.0l-7.2_mips.deb
stable/main/binary-mips/libstonith-dev_0.4.9.0l-7.2_mips.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-m68k/heartbeat_0.4.9.0l-7.2_m68k.deb
stable/main/binary-m68k/stonith_0.4.9.0l-7.2_m68k.deb
stable/main/binary-m68k/libstonith0_0.4.9.0l-7.2_m68k.deb
stable/main/binary-m68k/libstonith-dev_0.4.9.0l-7.2_m68k.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-ia64/stonith_0.4.9.0l-7.2_ia64.deb
stable/main/binary-ia64/libstonith0_0.4.9.0l-7.2_ia64.deb
stable/main/binary-ia64/heartbeat_0.4.9.0l-7.2_ia64.deb
stable/main/binary-ia64/libstonith-dev_0.4.9.0l-7.2_ia64.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-i386/libstonith-dev_0.4.9.0l-7.2_i386.deb
stable/main/binary-i386/heartbeat_0.4.9.0l-7.2_i386.deb
stable/main/binary-i386/stonith_0.4.9.0l-7.2_i386.deb
stable/main/binary-i386/libstonith0_0.4.9.0l-7.2_i386.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-hppa/libstonith0_0.4.9.0l-7.2_hppa.deb
stable/main/binary-hppa/stonith_0.4.9.0l-7.2_hppa.deb
stable/main/binary-hppa/heartbeat_0.4.9.0l-7.2_hppa.deb
stable/main/binary-hppa/libstonith-dev_0.4.9.0l-7.2_hppa.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-arm/libstonith0_0.4.9.0l-7.2_arm.deb
stable/main/binary-arm/heartbeat_0.4.9.0l-7.2_arm.deb
stable/main/binary-arm/stonith_0.4.9.0l-7.2_arm.deb
stable/main/binary-arm/libstonith-dev_0.4.9.0l-7.2_arm.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-alpha/libstonith-dev_0.4.9.0l-7.2_alpha.deb
stable/main/binary-alpha/libstonith0_0.4.9.0l-7.2_alpha.deb
stable/main/binary-alpha/stonith_0.4.9.0l-7.2_alpha.deb
stable/main/binary-alpha/heartbeat_0.4.9.0l-7.2_alpha.deb
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-sparc/heartbeat_0.4.9.0l-7.2_sparc.deb
stable/main/binary-all/ldirectord_0.4.9.0l-7.2_all.deb
stable/main/binary-sparc/stonith_0.4.9.0l-7.2_sparc.deb
stable/main/source/heartbeat_0.4.9.0l-7.2.diff.gz
stable/main/binary-sparc/libstonith0_0.4.9.0l-7.2_sparc.deb
stable/main/binary-sparc/libstonith-dev_0.4.9.0l-7.2_sparc.deb
stable/main/source/heartbeat_0.4.9.0l-7.2.dsc
heartbeat (0.4.9.0l-7.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed several buffer overflows found by Nathan Wallwork.


stable/main/binary-s390/gv_3.5.8-26.1_s390.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-powerpc/gv_3.5.8-26.1_powerpc.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-mipsel/gv_3.5.8-26.1_mipsel.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-mips/gv_3.5.8-26.1_mips.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-m68k/gv_3.5.8-26.1_m68k.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-ia64/gv_3.5.8-26.1_ia64.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-i386/gv_3.5.8-26.1_i386.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-hppa/gv_3.5.8-26.1_hppa.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-arm/gv_3.5.8-26.1_arm.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-alpha/gv_3.5.8-26.1_alpha.deb
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/source/gv_3.5.8-26.1.diff.gz
stable/main/binary-sparc/gv_3.5.8-26.1_sparc.deb
stable/main/source/gv_3.5.8-26.1.dsc
gv (1:3.5.8-26.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Apply patch from Olaf Kirch to fix buffer overflows


stable/main/binary-sparc/gtetrinet_0.4.1-9woody1.1_sparc.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/binary-s390/gtetrinet_0.4.1-9woody1.1_s390.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/binary-powerpc/gtetrinet_0.4.1-9woody1.1_powerpc.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/binary-mipsel/gtetrinet_0.4.1-9woody1.1_mipsel.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/binary-mips/gtetrinet_0.4.1-9woody1.1_mips.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/binary-m68k/gtetrinet_0.4.1-9woody1.1_m68k.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/binary-ia64/gtetrinet_0.4.1-9woody1.1_ia64.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/binary-hppa/gtetrinet_0.4.1-9woody1.1_hppa.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/binary-arm/gtetrinet_0.4.1-9woody1.1_arm.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/binary-alpha/gtetrinet_0.4.1-9woody1.1_alpha.deb
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends


stable/main/source/gtetrinet_0.4.1-9woody1.1.dsc
stable/main/binary-i386/gtetrinet_0.4.1-9woody1.1_i386.deb
stable/main/source/gtetrinet_0.4.1-9woody1.1.diff.gz
gtetrinet (0.4.1-9woody1.1) stable-security; urgency=high
  * Rebuild by security team since source-only uploads are not
    supported
  * Update Build-Depends
gtetrinet (0.4.1-9woody1) stable-security; urgency=HIGH
  * Apply patch from James Antill to fix multiple buffer overflows
    (Buqtraq ID: 6062).


stable/main/binary-sparc/gnome-pim-conduits_1.4.6-1woody1_sparc.deb
stable/main/binary-sparc/gnome-pim_1.4.6-1woody1_sparc.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-s390/gnome-pim-conduits_1.4.6-1woody1_s390.deb
stable/main/binary-s390/gnome-pim_1.4.6-1woody1_s390.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-powerpc/gnome-pim_1.4.6-1woody1_powerpc.deb
stable/main/binary-powerpc/gnome-pim-conduits_1.4.6-1woody1_powerpc.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-mipsel/gnome-pim-conduits_1.4.6-1woody1_mipsel.deb
stable/main/binary-mipsel/gnome-pim_1.4.6-1woody1_mipsel.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-mips/gnome-pim-conduits_1.4.6-1woody1_mips.deb
stable/main/binary-mips/gnome-pim_1.4.6-1woody1_mips.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-m68k/gnome-pim_1.4.6-1woody1_m68k.deb
stable/main/binary-m68k/gnome-pim-conduits_1.4.6-1woody1_m68k.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-ia64/gnome-pim-conduits_1.4.6-1woody1_ia64.deb
stable/main/binary-ia64/gnome-pim_1.4.6-1woody1_ia64.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-hppa/gnome-pim-conduits_1.4.6-1woody1_hppa.deb
stable/main/binary-hppa/gnome-pim_1.4.6-1woody1_hppa.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-arm/gnome-pim_1.4.6-1woody1_arm.deb
stable/main/binary-arm/gnome-pim-conduits_1.4.6-1woody1_arm.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-alpha/gnome-pim_1.4.6-1woody1_alpha.deb
stable/main/binary-alpha/gnome-pim-conduits_1.4.6-1woody1_alpha.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-i386/gnome-pim_1.4.6-1woody1_i386.deb
stable/main/source/gnome-pim_1.4.6-1woody1.diff.gz
stable/main/source/gnome-pim_1.4.6-1woody1.dsc
stable/main/binary-i386/gnome-pim-conduits_1.4.6-1woody1_i386.deb
gnome-pim (1.4.6-1woody1) stable; urgency=low
  * Recompiled on woody.


stable/main/binary-s390/gnome-gv_1.1.96-3.1_s390.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-powerpc/gnome-gv_1.1.96-3.1_powerpc.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-mipsel/gnome-gv_1.1.96-3.1_mipsel.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-mips/gnome-gv_1.1.96-3.1_mips.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-m68k/gnome-gv_1.1.96-3.1_m68k.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-ia64/gnome-gv_1.1.96-3.1_ia64.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-i386/gnome-gv_1.1.96-3.1_i386.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-hppa/gnome-gv_1.1.96-3.1_hppa.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-arm/gnome-gv_1.1.96-3.1_arm.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-alpha/gnome-gv_1.1.96-3.1_alpha.deb
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/source/gnome-gv_1.1.96-3.1.diff.gz
stable/main/binary-sparc/gnome-gv_1.1.96-3.1_sparc.deb
stable/main/source/gnome-gv_1.1.96-3.1.dsc
gnome-gv (1.1.96-3.1) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Applied security patch from Olaf Kirch to fix buffer overflows
    including secscanf.c


stable/main/binary-sparc/libc6-prof_2.2.5-11.2_sparc.deb
stable/main/binary-sparc/libc6-sparc64_2.2.5-11.2_sparc.deb
stable/main/binary-sparc/libc6_2.2.5-11.2_sparc.deb
stable/main/binary-sparc/libc6-pic_2.2.5-11.2_sparc.deb
stable/main/binary-sparc/libc6-dbg_2.2.5-11.2_sparc.deb
stable/main/binary-sparc/libc6-dev-sparc64_2.2.5-11.2_sparc.deb
stable/main/binary-sparc/nscd_2.2.5-11.2_sparc.deb
stable/main/binary-sparc/libc6-dev_2.2.5-11.2_sparc.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-s390/libc6-pic_2.2.5-11.2_s390.deb
stable/main/binary-s390/libc6-dev_2.2.5-11.2_s390.deb
stable/main/binary-s390/libc6_2.2.5-11.2_s390.deb
stable/main/binary-s390/libc6-prof_2.2.5-11.2_s390.deb
stable/main/binary-s390/libc6-dbg_2.2.5-11.2_s390.deb
stable/main/binary-s390/nscd_2.2.5-11.2_s390.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-powerpc/libc6_2.2.5-11.2_powerpc.deb
stable/main/binary-powerpc/libc6-dbg_2.2.5-11.2_powerpc.deb
stable/main/binary-powerpc/libc6-pic_2.2.5-11.2_powerpc.deb
stable/main/binary-powerpc/libc6-prof_2.2.5-11.2_powerpc.deb
stable/main/binary-powerpc/libc6-dev_2.2.5-11.2_powerpc.deb
stable/main/binary-powerpc/nscd_2.2.5-11.2_powerpc.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-mipsel/libc6-prof_2.2.5-11.2_mipsel.deb
stable/main/binary-mipsel/nscd_2.2.5-11.2_mipsel.deb
stable/main/binary-mipsel/libc6-dev_2.2.5-11.2_mipsel.deb
stable/main/binary-mipsel/libc6_2.2.5-11.2_mipsel.deb
stable/main/binary-mipsel/libc6-pic_2.2.5-11.2_mipsel.deb
stable/main/binary-mipsel/libc6-dbg_2.2.5-11.2_mipsel.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-mips/libc6-dev_2.2.5-11.2_mips.deb
stable/main/binary-mips/libc6-prof_2.2.5-11.2_mips.deb
stable/main/binary-mips/libc6_2.2.5-11.2_mips.deb
stable/main/binary-mips/libc6-dbg_2.2.5-11.2_mips.deb
stable/main/binary-mips/nscd_2.2.5-11.2_mips.deb
stable/main/binary-mips/libc6-pic_2.2.5-11.2_mips.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-ia64/libc6.1_2.2.5-11.2_ia64.deb
stable/main/binary-ia64/libc6.1-prof_2.2.5-11.2_ia64.deb
stable/main/binary-ia64/libc6.1-dev_2.2.5-11.2_ia64.deb
stable/main/binary-ia64/libc6.1-pic_2.2.5-11.2_ia64.deb
stable/main/binary-ia64/nscd_2.2.5-11.2_ia64.deb
stable/main/binary-ia64/libc6.1-dbg_2.2.5-11.2_ia64.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-i386/libc6-prof_2.2.5-11.2_i386.deb
stable/main/binary-i386/nscd_2.2.5-11.2_i386.deb
stable/main/binary-i386/libc6-dev_2.2.5-11.2_i386.deb
stable/main/binary-i386/libc6_2.2.5-11.2_i386.deb
stable/main/binary-i386/libc6-pic_2.2.5-11.2_i386.deb
stable/main/binary-i386/libc6-dbg_2.2.5-11.2_i386.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-hppa/libc6-dev_2.2.5-11.2_hppa.deb
stable/main/binary-hppa/nscd_2.2.5-11.2_hppa.deb
stable/main/binary-hppa/libc6-dbg_2.2.5-11.2_hppa.deb
stable/main/binary-hppa/libc6-prof_2.2.5-11.2_hppa.deb
stable/main/binary-hppa/libc6_2.2.5-11.2_hppa.deb
stable/main/binary-hppa/libc6-pic_2.2.5-11.2_hppa.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-arm/libc6-prof_2.2.5-11.2_arm.deb
stable/main/binary-arm/libc6-dbg_2.2.5-11.2_arm.deb
stable/main/binary-arm/libc6_2.2.5-11.2_arm.deb
stable/main/binary-arm/libc6-pic_2.2.5-11.2_arm.deb
stable/main/binary-arm/libc6-dev_2.2.5-11.2_arm.deb
stable/main/binary-arm/nscd_2.2.5-11.2_arm.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-alpha/nscd_2.2.5-11.2_alpha.deb
stable/main/binary-alpha/libc6.1-pic_2.2.5-11.2_alpha.deb
stable/main/binary-alpha/libc6.1_2.2.5-11.2_alpha.deb
stable/main/binary-alpha/libc6.1-dbg_2.2.5-11.2_alpha.deb
stable/main/binary-alpha/libc6.1-dev_2.2.5-11.2_alpha.deb
stable/main/binary-alpha/libc6.1-prof_2.2.5-11.2_alpha.deb
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-all/locales_2.2.5-11.2_all.deb
stable/main/binary-m68k/libc6-dbg_2.2.5-11.2_m68k.deb
stable/main/binary-m68k/libc6_2.2.5-11.2_m68k.deb
stable/main/binary-m68k/libc6-prof_2.2.5-11.2_m68k.deb
stable/main/binary-all/glibc-doc_2.2.5-11.2_all.deb
stable/main/binary-m68k/libc6-dev_2.2.5-11.2_m68k.deb
stable/main/binary-m68k/libc6-pic_2.2.5-11.2_m68k.deb
stable/main/binary-m68k/nscd_2.2.5-11.2_m68k.deb
stable/main/source/glibc_2.2.5-11.2.dsc
stable/main/source/glibc_2.2.5-11.2.diff.gz
glibc (2.2.5-11.2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Activated the patch against XDR and malloc problems *grr*
  * Added extra patch to malloc.c for security related bug (from -11.1)
  * Exchanged xhdr/malloc patch with the one from Wolfram Gloger


stable/main/binary-s390/g++-2.95_2.95.4-11woody1_s390.deb
stable/main/binary-s390/protoize-2.95_2.95.4-11woody1_s390.deb
stable/main/binary-s390/gobjc-2.95_2.95.4-11woody1_s390.deb
stable/main/binary-s390/libstdc++2.10-dbg_2.95.4-11woody1_s390.deb
stable/main/binary-s390/cpp-2.95_2.95.4-11woody1_s390.deb
stable/main/binary-s390/gcc-2.95_2.95.4-11woody1_s390.deb
stable/main/binary-s390/libg++2.8.1.3-dev_2.95.4-11woody1_s390.deb
stable/main/binary-s390/libstdc++2.10-glibc2.2_2.95.4-11woody1_s390.deb
stable/main/binary-s390/libstdc++2.10-dev_2.95.4-11woody1_s390.deb
stable/main/binary-s390/libg++2.8.1.3-dbg_2.95.4-11woody1_s390.deb
stable/main/binary-s390/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_s390.deb
stable/main/binary-s390/chill-2.95_2.95.4-11woody1_s390.deb
stable/main/binary-s390/g77-2.95_2.95.4-11woody1_s390.deb
stable/main/binary-s390/gpc-2.95_2.95.4-11woody1_s390.deb
gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low
  * Upload to woody-proposed-updates:
    - Fix profiling for arm.
    - Fix internal compiler errors on s390.
    - Update Pascal release candidate 7 to final release.
    - Build the protoize-2.95 package again just in case that somebody
      relies on the protoize-2.95 and unprotoize-2.95 binaries.
    - No other changes to other compilers and architectures.


stable/main/binary-powerpc/libg++2.8.1.3-dbg_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/gcc-2.95_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/libstdc++2.10-glibc2.2_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/gpc-2.95_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/gobjc-2.95_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/gcc-2.95-nof_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/libstdc++2.10-dev_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/chill-2.95_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/g++-2.95_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/cpp-2.95_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/libg++2.8.1.3-dev_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/g77-2.95_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/libstdc++2.10-dbg_2.95.4-11woody1_powerpc.deb
stable/main/binary-powerpc/protoize-2.95_2.95.4-11woody1_powerpc.deb
gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low
  * Upload to woody-proposed-updates:
    - Fix profiling for arm.
    - Fix internal compiler errors on s390.
    - Update Pascal release candidate 7 to final release.
    - Build the protoize-2.95 package again just in case that somebody
      relies on the protoize-2.95 and unprotoize-2.95 binaries.
    - No other changes to other compilers and architectures.


stable/main/binary-m68k/chill-2.95_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/libstdc++2.10-dev_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/protoize-2.95_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/gobjc-2.95_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/cpp-2.95_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/libg++2.8.1.3-dbg_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/gcc-2.95_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/gpc-2.95_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/libstdc++2.10-dbg_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/libstdc++2.10-glibc2.2_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/g77-2.95_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/libg++2.8.1.3-dev_2.95.4-11woody1_m68k.deb
stable/main/binary-m68k/g++-2.95_2.95.4-11woody1_m68k.deb
gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low
  * Upload to woody-proposed-updates:
    - Fix profiling for arm.
    - Fix internal compiler errors on s390.
    - Update Pascal release candidate 7 to final release.
    - Build the protoize-2.95 package again just in case that somebody
      relies on the protoize-2.95 and unprotoize-2.95 binaries.
    - No other changes to other compilers and architectures.


stable/main/binary-arm/g77-2.95_2.95.4-11woody1_arm.deb
stable/main/binary-arm/gobjc-2.95_2.95.4-11woody1_arm.deb
stable/main/binary-arm/chill-2.95_2.95.4-11woody1_arm.deb
stable/main/binary-arm/gcc-2.95_2.95.4-11woody1_arm.deb
stable/main/binary-arm/libstdc++2.10-dev_2.95.4-11woody1_arm.deb
stable/main/binary-arm/cpp-2.95_2.95.4-11woody1_arm.deb
stable/main/binary-arm/libg++2.8.1.3-dev_2.95.4-11woody1_arm.deb
stable/main/binary-arm/libg++2.8.1.3-dbg_2.95.4-11woody1_arm.deb
stable/main/binary-arm/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_arm.deb
stable/main/binary-arm/libstdc++2.10-dbg_2.95.4-11woody1_arm.deb
stable/main/binary-arm/gpc-2.95_2.95.4-11woody1_arm.deb
stable/main/binary-arm/g++-2.95_2.95.4-11woody1_arm.deb
stable/main/binary-arm/protoize-2.95_2.95.4-11woody1_arm.deb
stable/main/binary-arm/libstdc++2.10-glibc2.2_2.95.4-11woody1_arm.deb
gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low
  * Upload to woody-proposed-updates:
    - Fix profiling for arm.
    - Fix internal compiler errors on s390.
    - Update Pascal release candidate 7 to final release.
    - Build the protoize-2.95 package again just in case that somebody
      relies on the protoize-2.95 and unprotoize-2.95 binaries.
    - No other changes to other compilers and architectures.


stable/main/binary-alpha/libstdc++2.10-dbg_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/g++-2.95_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/gpc-2.95_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/libstdc++2.10-dev_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/gobjc-2.95_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/libstdc++2.10-glibc2.2_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/cpp-2.95_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/libg++2.8.1.3-dev_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/gcc-2.95_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/libg++2.8.1.3-dbg_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/g77-2.95_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/protoize-2.95_2.95.4-11woody1_alpha.deb
stable/main/binary-alpha/chill-2.95_2.95.4-11woody1_alpha.deb
gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low
  * Upload to woody-proposed-updates:
    - Fix profiling for arm.
    - Fix internal compiler errors on s390.
    - Update Pascal release candidate 7 to final release.
    - Build the protoize-2.95 package again just in case that somebody
      relies on the protoize-2.95 and unprotoize-2.95 binaries.
    - No other changes to other compilers and architectures.


stable/main/binary-i386/g77-2.95_2.95.4-11woody1_i386.deb
stable/main/binary-i386/gcc-2.95_2.95.4-11woody1_i386.deb
stable/main/binary-i386/gpc-2.95_2.95.4-11woody1_i386.deb
stable/main/binary-all/gcc-2.95-doc_2.95.4-11woody1_all.deb
stable/main/binary-i386/protoize-2.95_2.95.4-11woody1_i386.deb
stable/main/binary-all/cpp-2.95-doc_2.95.4-11woody1_all.deb
stable/main/binary-i386/gobjc-2.95_2.95.4-11woody1_i386.deb
stable/main/binary-i386/libg++2.8.1.3-dev_2.95.4-11woody1_i386.deb
stable/main/binary-i386/libstdc++2.10-dev_2.95.4-11woody1_i386.deb
stable/main/binary-i386/cpp-2.95_2.95.4-11woody1_i386.deb
stable/main/source/gcc-2.95_2.95.4.ds13-11woody1.diff.gz
stable/main/binary-all/gpc-2.95-doc_2.95.4-11woody1_all.deb
stable/main/binary-i386/libg++2.8.1.3-dbg_2.95.4-11woody1_i386.deb
stable/main/binary-all/g77-2.95-doc_2.95.4-11woody1_all.deb
stable/main/binary-i386/libstdc++2.10-glibc2.2_2.95.4-11woody1_i386.deb
stable/main/source/gcc-2.95_2.95.4.ds13-11woody1.dsc
stable/main/binary-i386/libstdc++2.10-dbg_2.95.4-11woody1_i386.deb
stable/main/binary-i386/g++-2.95_2.95.4-11woody1_i386.deb
stable/main/binary-i386/libg++2.8.1.3-glibc2.2_2.95.4-11woody1_i386.deb
stable/main/binary-i386/chill-2.95_2.95.4-11woody1_i386.deb
gcc-2.95 (2.95.4.ds13-11woody1) stable; urgency=low
  * Upload to woody-proposed-updates:
    - Fix profiling for arm.
    - Fix internal compiler errors on s390.
    - Update Pascal release candidate 7 to final release.
    - Build the protoize-2.95 package again just in case that somebody
      relies on the protoize-2.95 and unprotoize-2.95 binaries.
    - No other changes to other compilers and architectures.


stable/main/source/gallery_1.2.5-7.woody.0.diff.gz
stable/main/source/gallery_1.2.5-7.woody.0.dsc
stable/main/binary-all/gallery_1.2.5-7.woody.0_all.deb
gallery (1.2.5-7.woody.0) stable-security; urgency=high
  * SECURITY: fix from upstream CVS to stop remote command execution through
    $GALLERY_BASEDIR var.


stable/main/binary-s390/gaim-common_0.58-2.3_s390.deb
stable/main/binary-s390/gaim_0.58-2.3_s390.deb
stable/main/binary-s390/gaim-gnome_0.58-2.3_s390.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-powerpc/gaim_0.58-2.3_powerpc.deb
stable/main/binary-powerpc/gaim-gnome_0.58-2.3_powerpc.deb
stable/main/binary-powerpc/gaim-common_0.58-2.3_powerpc.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-mipsel/gaim-common_0.58-2.3_mipsel.deb
stable/main/binary-mipsel/gaim_0.58-2.3_mipsel.deb
stable/main/binary-mipsel/gaim-gnome_0.58-2.3_mipsel.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-mips/gaim_0.58-2.3_mips.deb
stable/main/binary-mips/gaim-common_0.58-2.3_mips.deb
stable/main/binary-mips/gaim-gnome_0.58-2.3_mips.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-m68k/gaim-common_0.58-2.3_m68k.deb
stable/main/binary-m68k/gaim_0.58-2.3_m68k.deb
stable/main/binary-m68k/gaim-gnome_0.58-2.3_m68k.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-ia64/gaim-gnome_0.58-2.3_ia64.deb
stable/main/binary-ia64/gaim_0.58-2.3_ia64.deb
stable/main/binary-ia64/gaim-common_0.58-2.3_ia64.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-i386/gaim-gnome_0.58-2.3_i386.deb
stable/main/binary-i386/gaim-common_0.58-2.3_i386.deb
stable/main/binary-i386/gaim_0.58-2.3_i386.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-hppa/gaim-gnome_0.58-2.3_hppa.deb
stable/main/binary-hppa/gaim_0.58-2.3_hppa.deb
stable/main/binary-hppa/gaim-common_0.58-2.3_hppa.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-arm/gaim-common_0.58-2.3_arm.deb
stable/main/binary-arm/gaim-gnome_0.58-2.3_arm.deb
stable/main/binary-arm/gaim_0.58-2.3_arm.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-alpha/gaim-common_0.58-2.3_alpha.deb
stable/main/binary-alpha/gaim-gnome_0.58-2.3_alpha.deb
stable/main/binary-alpha/gaim_0.58-2.3_alpha.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/source/gaim_0.58-2.3.diff.gz
stable/main/binary-sparc/gaim-common_0.58-2.3_sparc.deb
stable/main/binary-sparc/gaim_0.58-2.3_sparc.deb
stable/main/source/gaim_0.58-2.3.dsc
stable/main/binary-sparc/gaim-gnome_0.58-2.3_sparc.deb
gaim (1:0.58-2.3) stable-security; urgency=medium
  * Non-maintainer upload by Security Team
  * Applied patch from Christopher Blizzard <blizzard@redhat.com> to add a
    missing malloc() before **argv is actually used.  This was introduced
    in the security patch and tends to crash Gaim.


stable/main/binary-s390/fetchmail-ssl_5.9.11-6.1_s390.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-powerpc/fetchmail-ssl_5.9.11-6.1_powerpc.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-mipsel/fetchmail-ssl_5.9.11-6.1_mipsel.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-mips/fetchmail-ssl_5.9.11-6.1_mips.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-m68k/fetchmail-ssl_5.9.11-6.1_m68k.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-ia64/fetchmail-ssl_5.9.11-6.1_ia64.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-i386/fetchmail-ssl_5.9.11-6.1_i386.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-hppa/fetchmail-ssl_5.9.11-6.1_hppa.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-arm/fetchmail-ssl_5.9.11-6.1_arm.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-alpha/fetchmail-ssl_5.9.11-6.1_alpha.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/source/fetchmail-ssl_5.9.11-6.1.dsc
stable/main/source/fetchmail-ssl_5.9.11-6.1.diff.gz
stable/main/binary-sparc/fetchmail-ssl_5.9.11-6.1_sparc.deb
fetchmail-ssl (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-s390/fetchmail_5.9.11-6.1_s390.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-powerpc/fetchmail_5.9.11-6.1_powerpc.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-mipsel/fetchmail_5.9.11-6.1_mipsel.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-mips/fetchmail_5.9.11-6.1_mips.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-m68k/fetchmail_5.9.11-6.1_m68k.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-ia64/fetchmail_5.9.11-6.1_ia64.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-i386/fetchmail_5.9.11-6.1_i386.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-hppa/fetchmail_5.9.11-6.1_hppa.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-arm/fetchmail_5.9.11-6.1_arm.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-alpha/fetchmail_5.9.11-6.1_alpha.deb
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-all/fetchmailconf_5.9.11-6.1_all.deb
stable/main/source/fetchmail_5.9.11-6.1.dsc
stable/main/binary-sparc/fetchmail_5.9.11-6.1_sparc.deb
stable/main/binary-all/fetchmail-common_5.9.11-6.1_all.deb
stable/main/source/fetchmail_5.9.11-6.1.diff.gz
fetchmail (5.9.11-6.1) stable-security; urgency=high
  * SECURITY FIX: Stefan Esser's fix for potential remote vulnerability in
    multidrop mode (backported from new upstream 6.1.0)


stable/main/binary-s390/fam_2.6.6.1-5.2_s390.deb
stable/main/binary-s390/libfam-dev_2.6.6.1-5.2_s390.deb
stable/main/binary-s390/libfam0_2.6.6.1-5.2_s390.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-powerpc/libfam-dev_2.6.6.1-5.2_powerpc.deb
stable/main/binary-powerpc/fam_2.6.6.1-5.2_powerpc.deb
stable/main/binary-powerpc/libfam0_2.6.6.1-5.2_powerpc.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-mipsel/fam_2.6.6.1-5.2_mipsel.deb
stable/main/binary-mipsel/libfam-dev_2.6.6.1-5.2_mipsel.deb
stable/main/binary-mipsel/libfam0_2.6.6.1-5.2_mipsel.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-mips/libfam-dev_2.6.6.1-5.2_mips.deb
stable/main/binary-mips/libfam0_2.6.6.1-5.2_mips.deb
stable/main/binary-mips/fam_2.6.6.1-5.2_mips.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-m68k/libfam0_2.6.6.1-5.2_m68k.deb
stable/main/binary-m68k/libfam-dev_2.6.6.1-5.2_m68k.deb
stable/main/binary-m68k/fam_2.6.6.1-5.2_m68k.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-ia64/fam_2.6.6.1-5.2_ia64.deb
stable/main/binary-ia64/libfam0_2.6.6.1-5.2_ia64.deb
stable/main/binary-ia64/libfam-dev_2.6.6.1-5.2_ia64.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-i386/fam_2.6.6.1-5.2_i386.deb
stable/main/binary-i386/libfam0_2.6.6.1-5.2_i386.deb
stable/main/binary-i386/libfam-dev_2.6.6.1-5.2_i386.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-hppa/libfam-dev_2.6.6.1-5.2_hppa.deb
stable/main/binary-hppa/libfam0_2.6.6.1-5.2_hppa.deb
stable/main/binary-hppa/fam_2.6.6.1-5.2_hppa.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-arm/fam_2.6.6.1-5.2_arm.deb
stable/main/binary-arm/libfam0_2.6.6.1-5.2_arm.deb
stable/main/binary-arm/libfam-dev_2.6.6.1-5.2_arm.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-alpha/libfam0_2.6.6.1-5.2_alpha.deb
stable/main/binary-alpha/libfam-dev_2.6.6.1-5.2_alpha.deb
stable/main/binary-alpha/fam_2.6.6.1-5.2_alpha.deb
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-sparc/libfam-dev_2.6.6.1-5.2_sparc.deb
stable/main/source/fam_2.6.6.1-5.2.diff.gz
stable/main/binary-sparc/libfam0_2.6.6.1-5.2_sparc.deb
stable/main/binary-sparc/fam_2.6.6.1-5.2_sparc.deb
stable/main/source/fam_2.6.6.1-5.2.dsc
fam (2.6.6.1-5.2) stable-security; urgency=medium
  * Non-maintainer upload by security team
  * Reworked the patch SGI provided, i.e. removed new code, removed
    variable renaming, removed two potential integer overflows and
    smoothed the code, so it's a clean patch one can actually grok.
  * Second version, missed commented out code and string output
  * Rebuilt for stable-security so we can install it
  * Included from the maintainer release:
    . Add Recommends: fam to libfam0 for libfam without fam makes not much
      sense except for those using fam over the net.
    . Make dnotify handle the absence of dnotify-fcntl in the kernel
      and use polling (see: Bug#148853)


stable/main/binary-s390/ethereal-common_0.9.4-1woody2_s390.deb
stable/main/binary-s390/tethereal_0.9.4-1woody2_s390.deb
stable/main/binary-s390/ethereal-dev_0.9.4-1woody2_s390.deb
stable/main/binary-s390/ethereal_0.9.4-1woody2_s390.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-powerpc/ethereal_0.9.4-1woody2_powerpc.deb
stable/main/binary-powerpc/ethereal-dev_0.9.4-1woody2_powerpc.deb
stable/main/binary-powerpc/ethereal-common_0.9.4-1woody2_powerpc.deb
stable/main/binary-powerpc/tethereal_0.9.4-1woody2_powerpc.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-mipsel/ethereal-common_0.9.4-1woody2_mipsel.deb
stable/main/binary-mipsel/tethereal_0.9.4-1woody2_mipsel.deb
stable/main/binary-mipsel/ethereal-dev_0.9.4-1woody2_mipsel.deb
stable/main/binary-mipsel/ethereal_0.9.4-1woody2_mipsel.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-mips/ethereal-dev_0.9.4-1woody2_mips.deb
stable/main/binary-mips/ethereal-common_0.9.4-1woody2_mips.deb
stable/main/binary-mips/tethereal_0.9.4-1woody2_mips.deb
stable/main/binary-mips/ethereal_0.9.4-1woody2_mips.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-m68k/ethereal-dev_0.9.4-1woody2_m68k.deb
stable/main/binary-m68k/ethereal-common_0.9.4-1woody2_m68k.deb
stable/main/binary-m68k/ethereal_0.9.4-1woody2_m68k.deb
stable/main/binary-m68k/tethereal_0.9.4-1woody2_m68k.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-ia64/tethereal_0.9.4-1woody2_ia64.deb
stable/main/binary-ia64/ethereal_0.9.4-1woody2_ia64.deb
stable/main/binary-ia64/ethereal-common_0.9.4-1woody2_ia64.deb
stable/main/binary-ia64/ethereal-dev_0.9.4-1woody2_ia64.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-i386/ethereal_0.9.4-1woody2_i386.deb
stable/main/binary-i386/ethereal-common_0.9.4-1woody2_i386.deb
stable/main/binary-i386/tethereal_0.9.4-1woody2_i386.deb
stable/main/binary-i386/ethereal-dev_0.9.4-1woody2_i386.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-hppa/ethereal-common_0.9.4-1woody2_hppa.deb
stable/main/binary-hppa/tethereal_0.9.4-1woody2_hppa.deb
stable/main/binary-hppa/ethereal-dev_0.9.4-1woody2_hppa.deb
stable/main/binary-hppa/ethereal_0.9.4-1woody2_hppa.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-arm/ethereal-common_0.9.4-1woody2_arm.deb
stable/main/binary-arm/tethereal_0.9.4-1woody2_arm.deb
stable/main/binary-arm/ethereal-dev_0.9.4-1woody2_arm.deb
stable/main/binary-arm/ethereal_0.9.4-1woody2_arm.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-alpha/ethereal-dev_0.9.4-1woody2_alpha.deb
stable/main/binary-alpha/ethereal-common_0.9.4-1woody2_alpha.deb
stable/main/binary-alpha/ethereal_0.9.4-1woody2_alpha.deb
stable/main/binary-alpha/tethereal_0.9.4-1woody2_alpha.deb
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/binary-sparc/ethereal_0.9.4-1woody2_sparc.deb
stable/main/binary-sparc/ethereal-dev_0.9.4-1woody2_sparc.deb
stable/main/binary-sparc/ethereal-common_0.9.4-1woody2_sparc.deb
stable/main/source/ethereal_0.9.4-1woody2.dsc
stable/main/binary-sparc/tethereal_0.9.4-1woody2_sparc.deb
stable/main/source/ethereal_0.9.4-1woody2.diff.gz
ethereal (0.9.4-1woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Applied upstream patch to fixe a buffer overflow in ISIS dissector,
    denoted as "Use a GString to hold the formatted area address, so that
    we don't overflow a fixed-length buffer."
  (see http://www.ethereal.com/appnotes/enpa-sa-00006.html, CAN-2002-0834)


stable/main/source/eroaster_2.1.0.0.3-2.dsc
stable/main/binary-all/eroaster_2.1.0.0.3-2_all.deb
stable/main/source/eroaster_2.1.0.0.3-2.diff.gz
eroaster (2.1.0.0.3-2) stable; urgency=low
  * Fixed a typo that broke image creation with mkisofs if only the image
    was being created, ie if not part of create image/burn operation
    (closes: #170277)


stable/main/source/epic4-script-light_2.7.30p5-1.1.diff.gz
stable/main/binary-all/epic4-script-light_2.7.30p5-1.1_all.deb
stable/main/source/epic4-script-light_2.7.30p5-1.1.dsc
epic4-script-light (1:2.7.30p5-1.1) stable-security; urgency=high
  * Non-maintainer upload by Security team
  * Security update for stable which fixes double evaluation of $-expandos
    in dangerous cases.
  * Applied upstream fix for brokenly fixed double evaluation of
    $-expandos in nickname and channel name when zapping


stable/main/binary-alpha/elk_3.0-8.1_alpha.deb
elk (3.0-8.1) unstable; urgency=low
  * NMU.
  * Added missing build dependencies (closes: #109854, #116532).
  * Fix menu item (closes: #121004).
  * Apply patch to make package lintian clean (closes: #126987).
  * src/build: include debian/arch-config to specify build flags for
    the alpha (-O0). May fix #59893.


stable/main/source/docbook-xml-slides_1.1-2.1woody2.dsc
stable/main/source/docbook-xml-slides_1.1-2.1woody2.diff.gz
stable/main/binary-all/docbook-xml-slides_1.1-2.1woody2_all.deb
docbook-xml-slides (1.1-2.1woody2) stable; urgency=low
  * Really upload to woody.
docbook-xml-slides (1.1-2.1woody1) unstable; urgency=low
  * Non-maintainer upload.
  * Backported to woody.
docbook-xml-slides (1.1-2.2) unstable; urgency=medium
  * Non-maintainer upload
  * Fixed dependency, so that this package can coexist with others
    (Closes: #157398).  This should have been done long ago, I'll be
    preparing a version for woody as well - I already had to rebuild this
    package twice, and already explained to other people on IRC how to do
    that themselves.
  * Use Build-depends-indep, not just build-depends, as lintian noticed.


stable/main/binary-powerpc/dietlibc-dev_0.12-2.4_powerpc.deb
dietlibc (0.12-2.4) stable-security; urgency=medium
  * Fix potential division by zero chance in calloc integer overflow check
    (discussed with and forwarded from upstream).


stable/main/binary-mipsel/dietlibc-dev_0.12-2.4_mipsel.deb
dietlibc (0.12-2.4) stable-security; urgency=medium
  * Fix potential division by zero chance in calloc integer overflow check
    (discussed with and forwarded from upstream).


stable/main/binary-mips/dietlibc-dev_0.12-2.4_mips.deb
dietlibc (0.12-2.4) stable-security; urgency=medium
  * Fix potential division by zero chance in calloc integer overflow check
    (discussed with and forwarded from upstream).


stable/main/binary-i386/dietlibc-dev_0.12-2.4_i386.deb
dietlibc (0.12-2.4) stable-security; urgency=medium
  * Fix potential division by zero chance in calloc integer overflow check
    (discussed with and forwarded from upstream).


stable/main/binary-arm/dietlibc-dev_0.12-2.4_arm.deb
dietlibc (0.12-2.4) stable-security; urgency=medium
  * Fix potential division by zero chance in calloc integer overflow check
    (discussed with and forwarded from upstream).


stable/main/binary-alpha/dietlibc-dev_0.12-2.4_alpha.deb
dietlibc (0.12-2.4) stable-security; urgency=medium
  * Fix potential division by zero chance in calloc integer overflow check
    (discussed with and forwarded from upstream).


stable/main/source/dietlibc_0.12-2.4.diff.gz
stable/main/binary-all/dietlibc-doc_0.12-2.4_all.deb
stable/main/binary-sparc/dietlibc-dev_0.12-2.4_sparc.deb
stable/main/source/dietlibc_0.12-2.4.dsc
dietlibc (0.12-2.4) stable-security; urgency=medium
  * Fix potential division by zero chance in calloc integer overflow check
    (discussed with and forwarded from upstream).


stable/main/source/defrag_0.73pjm1-1.woody.0.dsc
stable/main/binary-i386/defrag_0.73pjm1-1.woody.0_i386.deb
stable/main/source/defrag_0.73pjm1-1.woody.0.diff.gz
defrag (0.73pjm1-1.woody.0) stable; urgency=high
  * debian/control: fixed speling erorr in package description (closes: #124541)
  * debian/copyright: fixed mis-spelling common-licences -> common-licenses
  * ext2.c: Gracefully fail on filesystems with journals (closes: #118635).
    This fixes a bug that causes filesystem corruption when defrag is run on
    ext3 filesystems.


stable/main/source/debiandoc-sgml_1.1.67woody1.dsc
stable/main/source/debiandoc-sgml_1.1.67woody1.tar.gz
stable/main/binary-all/debiandoc-sgml_1.1.67woody1_all.deb
debiandoc-sgml (1.1.67woody1) stable; urgency=low
  * debian/postinst: added invocation of 'install-sgmlcatalog --remove
    debiandoc-sgml' to clean up cruft potentially left over from the SGML
    catalog transition in a potato -> woody upgrade
    (closes: Bug#154737)


stable/main/source/cron-apt_0.0.6woody1.tar.gz
stable/main/source/cron-apt_0.0.6woody1.dsc
stable/main/binary-all/cron-apt_0.0.6woody1_all.deb
cron-apt (0.0.6woody1) stable; urgency=high
  * Added default path so the upgrade will work fine. Thanks to Donovan
    Baarda <abo@minkirri.apana.org.au> for pointing out the problem.
    Closes: #158869.
    This is a backport from version 0.0.7 which has been tested for a couple
    of months without any reports of failure.


stable/main/binary-sparc/courier-mta_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-debug_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-authmysql_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-pop_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-webadmin_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-maildrop_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-base_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/sqwebmail_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-imap_1.4.3-2.3_sparc.deb
stable/main/binary-sparc/courier-mlm_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-authdaemon_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-pcp_0.37.3-2.3_sparc.deb
stable/main/binary-sparc/courier-ldap_0.37.3-2.3_sparc.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-s390/courier-maildrop_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-ldap_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-imap_1.4.3-2.3_s390.deb
stable/main/binary-s390/courier-authdaemon_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-pop_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-pcp_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-webadmin_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-authmysql_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-mta_0.37.3-2.3_s390.deb
stable/main/binary-s390/sqwebmail_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-mlm_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-debug_0.37.3-2.3_s390.deb
stable/main/binary-s390/courier-base_0.37.3-2.3_s390.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-powerpc/courier-pcp_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-authdaemon_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-webadmin_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-pop_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-maildrop_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/sqwebmail_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-base_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-ldap_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-authmysql_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-imap_1.4.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-mlm_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-mta_0.37.3-2.3_powerpc.deb
stable/main/binary-powerpc/courier-debug_0.37.3-2.3_powerpc.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mips/courier-authmysql_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-imap_1.4.3-2.3_mips.deb
stable/main/binary-mips/courier-pop_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-webadmin_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-maildrop_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-ldap_0.37.3-2.3_mips.deb
stable/main/binary-mips/sqwebmail_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-mlm_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-pcp_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-mta_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-base_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-debug_0.37.3-2.3_mips.deb
stable/main/binary-mips/courier-authdaemon_0.37.3-2.3_mips.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-m68k/courier-authmysql_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-ldap_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-webadmin_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-imap_1.4.3-2.3_m68k.deb
stable/main/binary-m68k/courier-maildrop_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-base_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-authdaemon_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-pcp_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-debug_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/sqwebmail_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-mta_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-mlm_0.37.3-2.3_m68k.deb
stable/main/binary-m68k/courier-pop_0.37.3-2.3_m68k.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-ia64/courier-imap_1.4.3-2.3_ia64.deb
stable/main/binary-ia64/courier-authdaemon_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-pop_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-authmysql_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-base_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-ldap_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-pcp_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-mta_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-maildrop_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-debug_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-mlm_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/sqwebmail_0.37.3-2.3_ia64.deb
stable/main/binary-ia64/courier-webadmin_0.37.3-2.3_ia64.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-i386/courier-base_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-mta_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-authdaemon_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-webadmin_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-pop_0.37.3-2.3_i386.deb
stable/main/binary-i386/sqwebmail_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-imap_1.4.3-2.3_i386.deb
stable/main/binary-i386/courier-maildrop_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-mlm_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-debug_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-authmysql_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-ldap_0.37.3-2.3_i386.deb
stable/main/binary-i386/courier-pcp_0.37.3-2.3_i386.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-hppa/courier-base_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-webadmin_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-pop_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-mta_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-maildrop_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-imap_1.4.3-2.3_hppa.deb
stable/main/binary-hppa/courier-authdaemon_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-mlm_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/sqwebmail_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-ldap_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-pcp_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-debug_0.37.3-2.3_hppa.deb
stable/main/binary-hppa/courier-authmysql_0.37.3-2.3_hppa.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-arm/courier-debug_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-ldap_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-authmysql_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-base_0.37.3-2.3_arm.deb
stable/main/binary-arm/sqwebmail_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-imap_1.4.3-2.3_arm.deb
stable/main/binary-arm/courier-maildrop_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-mlm_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-pop_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-webadmin_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-pcp_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-authdaemon_0.37.3-2.3_arm.deb
stable/main/binary-arm/courier-mta_0.37.3-2.3_arm.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-alpha/courier-mta_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-maildrop_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-authdaemon_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-authmysql_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-webadmin_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/sqwebmail_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-imap_1.4.3-2.3_alpha.deb
stable/main/binary-alpha/courier-ldap_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-mlm_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-pcp_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-pop_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-debug_0.37.3-2.3_alpha.deb
stable/main/binary-alpha/courier-base_0.37.3-2.3_alpha.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-mipsel/courier-ldap_0.37.3-2.3_mipsel.deb
stable/main/binary-mipsel/courier-imap_1.4.3-2.3_mipsel.deb
stable/main/binary-mipsel/courier-maildrop_0.37.3-2.3_mipsel.deb
stable/main/binary-mipsel/courier-mlm_0.37.3-2.3_mipsel.deb
stable/main/binary-all/courier-doc_0.37.3-2.3_all.deb
stable/main/binary-mipsel/courier-webadmin_0.37.3-2.3_mipsel.deb
stable/main/binary-mipsel/courier-pop_0.37.3-2.3_mipsel.deb
stable/main/binary-mipsel/courier-pcp_0.37.3-2.3_mipsel.deb
stable/main/binary-mipsel/courier-authmysql_0.37.3-2.3_mipsel.deb
stable/main/binary-mipsel/courier-mta_0.37.3-2.3_mipsel.deb
stable/main/source/courier_0.37.3-2.3.dsc
stable/main/binary-mipsel/sqwebmail_0.37.3-2.3_mipsel.deb
stable/main/binary-mipsel/courier-base_0.37.3-2.3_mipsel.deb
stable/main/binary-mipsel/courier-debug_0.37.3-2.3_mipsel.deb
stable/main/source/courier_0.37.3-2.3.diff.gz
stable/main/binary-mipsel/courier-authdaemon_0.37.3-2.3_mipsel.deb
courier (0.37.3-2.3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Added special detection routine for big/little endianess on MIPS since
    the line "byteorder  : {big|little} endian" from /proc/cpuinfo was
    removed as of Linux 2.4.20, resulting in the mipsel buildd being
    unable to build this package.


stable/main/binary-all/bugzilla-doc_2.14.2-0woody2_all.deb
stable/main/source/bugzilla_2.14.2-0woody2.dsc
stable/main/binary-all/bugzilla_2.14.2-0woody2_all.deb
stable/main/source/bugzilla_2.14.2-0woody2.diff.gz
bugzilla (2.14.2-0woody2) stable-security; urgency=high
  * Non-maintainer upload by security team
  * Fixed bit handling for new products to avoid errors in group handling
    triggered by not exact Perl maths beyond 2^48.  Backport from new
    upstream 2.14.4.


stable/main/binary-sparc/bastille_1.3.0-2.1_sparc.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-s390/bastille_1.3.0-2.1_s390.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-powerpc/bastille_1.3.0-2.1_powerpc.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-mipsel/bastille_1.3.0-2.1_mipsel.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-mips/bastille_1.3.0-2.1_mips.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-m68k/bastille_1.3.0-2.1_m68k.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-ia64/bastille_1.3.0-2.1_ia64.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-hppa/bastille_1.3.0-2.1_hppa.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-arm/bastille_1.3.0-2.1_arm.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-alpha/bastille_1.3.0-2.1_alpha.deb
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/source/bastille_1.3.0-2.1.dsc
stable/main/binary-i386/bastille_1.3.0-2.1_i386.deb
stable/main/source/bastille_1.3.0-2.1.diff.gz
bastille (1:1.3.0-2.1) stable; urgency=medium
  * This is a release only for woodyr1. For production environments,
    however, Bastille-1.3.0-6 (or 2.0 is recommended)
  * Fixed Bastille/Logging.pm (Closes: #158803)
  * Fixed Bastille/Firewall.pm so that it installs the firewalling
    script (Closes: #147643)
  * Removed psad from this package (in 'sid' it's a separate package
    so it also helps transition). This includes modifying debian/rules,
    removing the PSAD stuff from Questions.txt (otherwise the backend
    does not know where to jump to) and changing the 'Required Distro'
    to exclude Debian (DB is already there in Questions.txt wherever
    LINUX is) (Closes: #150614)


stable/main/binary-mips/arcboot_0.3.3.9.woody.0_mips.deb
stable/main/source/arcboot_0.3.3.9.woody.0.dsc
stable/main/source/arcboot_0.3.3.9.woody.0.tar.gz
stable/main/binary-mips/tip22_0.3.3.9.woody.0_mips.deb
arcboot (0.3.3.9.woody.0) stable; urgency=medium
  * recompile 0.3.4 for Woody r1:
     - fix loader crashes on extfs errors
     - add tip22 (piggyback style tftp loader) needed by boot floppies
       for kernels newer then 2.4.16
  * disable debugging output


stable/main/binary-s390/apache-ssl_1.3.26.1+1.48-0woody3_s390.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-powerpc/apache-ssl_1.3.26.1+1.48-0woody3_powerpc.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-mipsel/apache-ssl_1.3.26.1+1.48-0woody3_mipsel.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-mips/apache-ssl_1.3.26.1+1.48-0woody3_mips.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-m68k/apache-ssl_1.3.26.1+1.48-0woody3_m68k.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-ia64/apache-ssl_1.3.26.1+1.48-0woody3_ia64.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-i386/apache-ssl_1.3.26.1+1.48-0woody3_i386.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-hppa/apache-ssl_1.3.26.1+1.48-0woody3_hppa.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-arm/apache-ssl_1.3.26.1+1.48-0woody3_arm.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-alpha/apache-ssl_1.3.26.1+1.48-0woody3_alpha.deb
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/source/apache-ssl_1.3.26.1+1.48-0woody3.diff.gz
stable/main/binary-sparc/apache-ssl_1.3.26.1+1.48-0woody3_sparc.deb
stable/main/source/apache-ssl_1.3.26.1+1.48-0woody3.dsc
apache-ssl (1.3.26.1+1.48-0woody3) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-s390/apache-perl_1.3.26-1-1.26-0woody2_s390.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-powerpc/apache-perl_1.3.26-1-1.26-0woody2_powerpc.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-mipsel/apache-perl_1.3.26-1-1.26-0woody2_mipsel.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-mips/apache-perl_1.3.26-1-1.26-0woody2_mips.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-m68k/apache-perl_1.3.26-1-1.26-0woody2_m68k.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-ia64/apache-perl_1.3.26-1-1.26-0woody2_ia64.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-i386/apache-perl_1.3.26-1-1.26-0woody2_i386.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-hppa/apache-perl_1.3.26-1-1.26-0woody2_hppa.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-arm/apache-perl_1.3.26-1-1.26-0woody2_arm.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-alpha/apache-perl_1.3.26-1-1.26-0woody2_alpha.deb
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-sparc/apache-perl_1.3.26-1-1.26-0woody2_sparc.deb
stable/main/source/apache-perl_1.3.26-1-1.26-0woody2.dsc
stable/main/source/apache-perl_1.3.26-1-1.26-0woody2.tar.gz
apache-perl (1.3.26-1-1.26-0woody2) stable-security; urgency=high
  * Non-maintainer upload by the Security Team
  * Backport security fixes from 1.3.27 for the following issues:
    - CAN-2002-0839 (shared memory scoreboard uid/gid)
    - CAN-2002-0840 (cross-site scripting in error page)
    - CAN-2002-0843 (buffer overflows in ApacheBench ab.c)
  * Fix insecure temporary file creation in htpasswd and htdigest
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-s390/apache-dev_1.3.26-0woody3_s390.deb
stable/main/binary-s390/apache-common_1.3.26-0woody3_s390.deb
stable/main/binary-s390/apache_1.3.26-0woody3_s390.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-powerpc/apache-dev_1.3.26-0woody3_powerpc.deb
stable/main/binary-powerpc/apache_1.3.26-0woody3_powerpc.deb
stable/main/binary-powerpc/apache-common_1.3.26-0woody3_powerpc.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-mipsel/apache_1.3.26-0woody3_mipsel.deb
stable/main/binary-mipsel/apache-common_1.3.26-0woody3_mipsel.deb
stable/main/binary-mipsel/apache-dev_1.3.26-0woody3_mipsel.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-mips/apache_1.3.26-0woody3_mips.deb
stable/main/binary-mips/apache-dev_1.3.26-0woody3_mips.deb
stable/main/binary-mips/apache-common_1.3.26-0woody3_mips.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-m68k/apache-dev_1.3.26-0woody3_m68k.deb
stable/main/binary-m68k/apache_1.3.26-0woody3_m68k.deb
stable/main/binary-m68k/apache-common_1.3.26-0woody3_m68k.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-ia64/apache_1.3.26-0woody3_ia64.deb
stable/main/binary-ia64/apache-dev_1.3.26-0woody3_ia64.deb
stable/main/binary-ia64/apache-common_1.3.26-0woody3_ia64.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-i386/apache-common_1.3.26-0woody3_i386.deb
stable/main/binary-i386/apache-dev_1.3.26-0woody3_i386.deb
stable/main/binary-i386/apache_1.3.26-0woody3_i386.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-hppa/apache-common_1.3.26-0woody3_hppa.deb
stable/main/binary-hppa/apache_1.3.26-0woody3_hppa.deb
stable/main/binary-hppa/apache-dev_1.3.26-0woody3_hppa.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-arm/apache-common_1.3.26-0woody3_arm.deb
stable/main/binary-arm/apache_1.3.26-0woody3_arm.deb
stable/main/binary-arm/apache-dev_1.3.26-0woody3_arm.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-alpha/apache_1.3.26-0woody3_alpha.deb
stable/main/binary-alpha/apache-dev_1.3.26-0woody3_alpha.deb
stable/main/binary-alpha/apache-common_1.3.26-0woody3_alpha.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-sparc/apache-dev_1.3.26-0woody3_sparc.deb
stable/main/source/apache_1.3.26-0woody3.diff.gz
stable/main/binary-sparc/apache_1.3.26-0woody3_sparc.deb
stable/main/binary-sparc/apache-common_1.3.26-0woody3_sparc.deb
stable/main/source/apache_1.3.26-0woody3.dsc
stable/main/binary-all/apache-doc_1.3.26-0woody3_all.deb
apache (1.3.26-0woody3) stable-security; urgency=medium
  * Added another fix against two overflowed buffer in the htdigest
    program


stable/main/binary-powerpc/afterstep_1.8.11-5woody1_powerpc.deb
afterstep (1.8.11-5woody1) stable; urgency=low
  * Upload file overlapping fix from 1.8.11-5 to woody.


stable/main/binary-arm/afterstep_1.8.11-5woody1_arm.deb
afterstep (1.8.11-5woody1) testing; urgency=low
  * Upload file overlapping fix from 1.8.11-5 to woody.

=========================================
Sat,  20 Jul 2002 - Debian 3.0r0 released
=========================================